Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 04:14
Static task
static1
Behavioral task
behavioral1
Sample
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe
Resource
win10v2004-20220812-en
General
-
Target
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe
-
Size
124KB
-
MD5
8c61b0f91e87a4276dadb68757d06ce6
-
SHA1
b36cd20fa4094fe4fe341444740c64d647f7de7a
-
SHA256
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48
-
SHA512
c4506d09d87f3944562129a5457cf92f98303bb877b7e3380fce4a2fc5d6bf3e754e60e54415d8d588df172f6b1f37e087b0a8fbc314d01a5bc28c92ab1b4807
-
SSDEEP
1536:05qi9cmPC1eMK8echCEjQemGaNslku4ZAjj/4YAncWb+d:M9cHmchCYQ1Bsl146/4Yidb+d
Malware Config
Extracted
tofsee
103.9.150.244
188.190.120.102
121.127.250.203
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
cpuhmzsa.execpuhmzsa.exepid process 2528 cpuhmzsa.exe 5028 cpuhmzsa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\cpuhmzsa.exe\"" 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.execpuhmzsa.execpuhmzsa.exedescription pid process target process PID 792 set thread context of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 2528 set thread context of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 5028 set thread context of 5040 5028 cpuhmzsa.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4228 5040 WerFault.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.execpuhmzsa.exepid process 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 2528 cpuhmzsa.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.execpuhmzsa.execpuhmzsa.exedescription pid process target process PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 792 wrote to memory of 1424 792 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe PID 1424 wrote to memory of 2528 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cpuhmzsa.exe PID 1424 wrote to memory of 2528 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cpuhmzsa.exe PID 1424 wrote to memory of 2528 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 2528 wrote to memory of 5028 2528 cpuhmzsa.exe cpuhmzsa.exe PID 5028 wrote to memory of 5040 5028 cpuhmzsa.exe svchost.exe PID 5028 wrote to memory of 5040 5028 cpuhmzsa.exe svchost.exe PID 5028 wrote to memory of 5040 5028 cpuhmzsa.exe svchost.exe PID 5028 wrote to memory of 5040 5028 cpuhmzsa.exe svchost.exe PID 5028 wrote to memory of 5040 5028 cpuhmzsa.exe svchost.exe PID 1424 wrote to memory of 1740 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cmd.exe PID 1424 wrote to memory of 1740 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cmd.exe PID 1424 wrote to memory of 1740 1424 063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe"C:\Users\Admin\AppData\Local\Temp\063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe"C:\Users\Admin\AppData\Local\Temp\063cc4d12c5a690504069405cbcae15796294d468b8159c0601f68c59a418b48.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\cpuhmzsa.exe"C:\Users\Admin\cpuhmzsa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\cpuhmzsa.exe"C:\Users\Admin\cpuhmzsa.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 3566⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4645.bat" "3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5040 -ip 50401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4645.batFilesize
302B
MD5641feece6097c5db7bc7dc9189cc97cd
SHA1a192a9783d587daefb072d87c34bf1a4debbd2fc
SHA2565a1c948b06b7680fd0f6a064ddfc36d5501e945c69c21dac8c1c4aa818360bb4
SHA512d191683a4c96e83d6b08380888825bedf147f08e3d0c24027694183351d26a560a1e9f2c42a664c17b1a191c727bcbca8d85db71db4d478522b28f997b6f903a
-
C:\Users\Admin\cpuhmzsa.exeFilesize
45.1MB
MD5e083d26c1f1acc8e8a090bf04bc72c96
SHA156ed70ef2f6f1afc40e3f912f50e0a4acf72905f
SHA2563dac0d4726348310175fc266c1c0b385ea094b07fb85157cb5a844f57e807741
SHA512ca5e6ca399ae3716c643719f15e74794880481720d1f23a387bebd04746e92c68895ac9662a003d180c2326ea7a58b70194c4b09a92ec67940122382f87c9078
-
C:\Users\Admin\cpuhmzsa.exeFilesize
45.1MB
MD5e083d26c1f1acc8e8a090bf04bc72c96
SHA156ed70ef2f6f1afc40e3f912f50e0a4acf72905f
SHA2563dac0d4726348310175fc266c1c0b385ea094b07fb85157cb5a844f57e807741
SHA512ca5e6ca399ae3716c643719f15e74794880481720d1f23a387bebd04746e92c68895ac9662a003d180c2326ea7a58b70194c4b09a92ec67940122382f87c9078
-
C:\Users\Admin\cpuhmzsa.exeFilesize
45.1MB
MD5e083d26c1f1acc8e8a090bf04bc72c96
SHA156ed70ef2f6f1afc40e3f912f50e0a4acf72905f
SHA2563dac0d4726348310175fc266c1c0b385ea094b07fb85157cb5a844f57e807741
SHA512ca5e6ca399ae3716c643719f15e74794880481720d1f23a387bebd04746e92c68895ac9662a003d180c2326ea7a58b70194c4b09a92ec67940122382f87c9078
-
memory/1424-138-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-137-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-134-0x0000000000000000-mapping.dmp
-
memory/1424-156-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1424-135-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1740-155-0x0000000000000000-mapping.dmp
-
memory/2528-139-0x0000000000000000-mapping.dmp
-
memory/5028-144-0x0000000000000000-mapping.dmp
-
memory/5028-152-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5040-150-0x0000000001250000-0x0000000001262000-memory.dmpFilesize
72KB
-
memory/5040-149-0x0000000000000000-mapping.dmp
-
memory/5040-154-0x0000000001250000-0x0000000001262000-memory.dmpFilesize
72KB