Analysis

  • max time kernel
    162s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:04

General

  • Target

    2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe

  • Size

    168KB

  • MD5

    454a3fb58e149902f7727496391200e0

  • SHA1

    4c9c5be7fbf71a84e53c770d7520f5593cc8c980

  • SHA256

    2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100

  • SHA512

    67348ebe3ae99386a47cfd7e516865d7a136fb521054f1a461808ee67e6356bbb0729d48f3413dee8910bbf6223fe59021f9b4eead77b248c5f5411ad1a019ac

  • SSDEEP

    768:c4lvMajhJP5iUwbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGBEv:c4RlVJh+lGVs4emEFbMP0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe
    "C:\Users\Admin\AppData\Local\Temp\2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\tozop.exe
      "C:\Users\Admin\tozop.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tozop.exe

    Filesize

    168KB

    MD5

    6a8702a19dee4b48bf98ffc9e5451d96

    SHA1

    b57c59f013646bf00936fda4ba11402cc9ca0a6f

    SHA256

    2385cc1ce139409001c260096390223028a1347f6a688e6e6a19d8a9138adae1

    SHA512

    5bf4216fe8b57581b56d0627114c00b1e63144f318fba8b664763c8f1cb8b89b79061408764a48b92b743fb6b6e3ab700d6fb228bc693af7533004a9b47ce2a5

  • C:\Users\Admin\tozop.exe

    Filesize

    168KB

    MD5

    6a8702a19dee4b48bf98ffc9e5451d96

    SHA1

    b57c59f013646bf00936fda4ba11402cc9ca0a6f

    SHA256

    2385cc1ce139409001c260096390223028a1347f6a688e6e6a19d8a9138adae1

    SHA512

    5bf4216fe8b57581b56d0627114c00b1e63144f318fba8b664763c8f1cb8b89b79061408764a48b92b743fb6b6e3ab700d6fb228bc693af7533004a9b47ce2a5

  • memory/772-132-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3144-135-0x0000000000000000-mapping.dmp

  • memory/3144-140-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3144-141-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB