Overview
overview
10Static
static
10TekDefense.exe
windows7-x64
7TekDefense.exe
windows10-2004-x64
7index 2.html
windows7-x64
1index 2.html
windows10-2004-x64
1index2 2.html
windows7-x64
1index2 2.html
windows10-2004-x64
1index3 2.html
windows7-x64
1index3 2.html
windows10-2004-x64
1ransomware.exe
windows7-x64
7ransomware.exe
windows10-2004-x64
7tekdefense.dll
windows7-x64
10tekdefense.dll
windows10-2004-x64
5Analysis
-
max time kernel
96s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 09:37
Behavioral task
behavioral1
Sample
TekDefense.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TekDefense.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
index 2.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
index 2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
index2 2.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
index2 2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
index3 2.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
index3 2.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
ransomware.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
ransomware.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
tekdefense.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
tekdefense.dll
Resource
win10v2004-20230220-en
General
-
Target
TekDefense.exe
-
Size
381KB
-
MD5
1d8b370a114f9490f36bebd77ed347d1
-
SHA1
91690d293bc2ecf4c77f46954d93b990269d8c0f
-
SHA256
f3e2e7ee2f7ff8be2e3812e3a3c4cbbec9dc560dfa62bada624aad85f1c56049
-
SHA512
947c0e165712656ac956023815a23cd549562aedbaf44bfec0ea9d132bd18bca914abced9747aa9a724ab21b1748240874cdd83aff4d235407ad0b68b2be286d
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIeENOy343jajyp:v6Wq4aaE6KwyF5L0Y2D1PqLxOyozaj2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation TekDefense.exe -
resource yara_rule behavioral2/memory/2208-135-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-144-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-147-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-156-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-157-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-160-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-169-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2208-172-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\denwz = "C:\\Windows\\SysWOW64\\lssas.exe" TekDefense.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run TekDefense.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2208-135-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-144-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-147-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-156-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-157-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-160-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-169-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2208-172-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\lssas.exe TekDefense.exe File opened for modification C:\Windows\SysWOW64\lssas.exe TekDefense.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4204 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2208 TekDefense.exe 2208 TekDefense.exe 2208 TekDefense.exe 2208 TekDefense.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1040 2208 TekDefense.exe 90 PID 2208 wrote to memory of 1040 2208 TekDefense.exe 90 PID 2208 wrote to memory of 1040 2208 TekDefense.exe 90 PID 1040 wrote to memory of 4204 1040 cmd.exe 92 PID 1040 wrote to memory of 4204 1040 cmd.exe 92 PID 1040 wrote to memory of 4204 1040 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\TekDefense.exe"C:\Users\Admin\AppData\Local\Temp\TekDefense.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\rm.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:4204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505B
MD52854bb73002f6d00fed33848122b1bc5
SHA1a7998a5a69ddc81bb29bdab9c4352fd9d7edc37f
SHA256853bbf3da224b0ffc0615e6e8e783042e3236ec23e7e618d0330818c20151eab
SHA5127bfd23313890675a0ab2f5eb4a1e5f626d4552af66cd938a4f79427fd45adb663abbcede88d184a4328715139734c1333ba550a4cc72bb79d340e2bfc6d1ff0e
-
Filesize
272B
MD5c23f2cf5a74e83fc26be8cb6b08491a9
SHA1b6445827774a7a3ff7e204a6174579ca3b2666b2
SHA2564789743515eca4e51c2da75cb7d6d1a7582f009cb3dec85567ab774ba0802831
SHA512289cc305095816e7e49e49e4b179aae62b4da469b3d48c9b8b6c9e9d7e55a650a7d159170fbd08e64a624843cb0d63e7f39a467bcb1b7440bb3cb26387fe77cc
-
Filesize
506B
MD530f2ed134d68e9db97b41776cb18b67e
SHA14cde84fb059ce10a186a517ad32f9ac0c501d88c
SHA25642343377736d72299b17c596b23128ef5657032883504d1f8afbcfd514501b27
SHA512960c139a2f6f4b6fe00904f3306fd1aaa9fa203133c0d6324e17c0fbccce92c9293d0b91fa7822c58bdd170373d27ee56b6f488d3894073ef3c9f882993666dd