Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:46
Behavioral task
behavioral1
Sample
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe
Resource
win7-20220812-en
General
-
Target
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe
-
Size
447KB
-
MD5
b11ac9f1dc4bc69b0e9e4fd9e70f3c2f
-
SHA1
6cb25247dc4fc65c157052dc619f9903193a53ad
-
SHA256
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2
-
SHA512
ff1317947b517aa1fcd52ac6e41c84fd0d168a501a710b6ebf62557ebbc1f1a8aa4b39bf30335d71e7a2c6382b14b60c83a640c261083b83e29814d682edbbbf
-
SSDEEP
12288:QjkArEN249AyE/rbaMct4bO2/VAZPYJ2pfsLEuhi4B:LFE//Tct4bOs/mUthN
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 384 netsh.exe 1900 netsh.exe 3984 netsh.exe -
Processes:
resource yara_rule behavioral2/memory/1284-132-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exepid process 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exepid process 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exedescription pid process target process PID 1284 wrote to memory of 384 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 384 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 384 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 1900 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 1900 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 1900 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 3984 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 3984 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 1284 wrote to memory of 3984 1284 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe"C:\Users\Admin\AppData\Local\Temp\bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall show rule name="TozomaaSO_Update"2⤵
- Modifies Windows Firewall
PID:384 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name=TozomaaSO_BG2⤵
- Modifies Windows Firewall
PID:1900 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="TozomaaSO_BG" dir=in action=allow program="C:\TozomaaSO\TozomaaBG.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3984