Overview
overview
9Static
static
3155绿色�...��.url
windows7-x64
1155绿色�...��.url
windows10-2004-x64
1RemoveWate...64.exe
windows7-x64
1RemoveWate...64.exe
windows10-2004-x64
1TCPZ_Overview.CHS.htm
windows7-x64
3TCPZ_Overview.CHS.htm
windows10-2004-x64
3TCPZ_Overview.ENU.htm
windows7-x64
3TCPZ_Overview.ENU.htm
windows10-2004-x64
3TCPZ_Overview.ITA.htm
windows7-x64
3TCPZ_Overview.ITA.htm
windows10-2004-x64
1tcpz.exe
windows7-x64
9tcpz.exe
windows10-2004-x64
9tcpz64.exe
windows7-x64
9tcpz64.exe
windows10-2004-x64
9Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RemoveWatermarkX64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RemoveWatermarkX64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
TCPZ_Overview.CHS.htm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
TCPZ_Overview.CHS.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
TCPZ_Overview.ENU.htm
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
TCPZ_Overview.ENU.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
TCPZ_Overview.ITA.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
TCPZ_Overview.ITA.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tcpz.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tcpz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tcpz64.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
tcpz64.exe
Resource
win10v2004-20240802-en
General
-
Target
tcpz.exe
-
Size
421KB
-
MD5
11d94b8c08add90829ea2b2c6d68bb76
-
SHA1
d1f3dd48835f67172b7f77ec07f8e30b713b149e
-
SHA256
2ad20c26380b36a0b9ff0e5d346a1b92c15c28f89e7e49e752f4432aa906e75d
-
SHA512
462146ba5e017c2ec5933529ae95933c6d965ac41ede574f6e48038e8326924ea696f8a9686b463e12e6cf0827c4f55f4116fb7fdba1f74fdf2d465bb6c4a57c
-
SSDEEP
3072:le/2TCkMuN/+vBEVSNBF6lib/yTmKy5OpeQwrIk8avRsX37EWbNuSQtAOZvszIcu:lAaN/+52SNBQ+yTm40Db+GdDTiblvE
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 2604 bcdedit.exe -
Enables test signing to bypass driver trust controls 1 TTPs 1 IoCs
Allows any signed driver to load without validation against a trusted certificate authority.
pid Process 2604 bcdedit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpz.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 tcpz.exe 2664 tcpz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2604 2664 tcpz.exe 30 PID 2664 wrote to memory of 2604 2664 tcpz.exe 30 PID 2664 wrote to memory of 2604 2664 tcpz.exe 30 PID 2664 wrote to memory of 2604 2664 tcpz.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\tcpz.exe"C:\Users\Admin\AppData\Local\Temp\tcpz.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110B
MD5419f1082bacb71e29bde91be7391b18f
SHA1fa613ba2e627181aa297b5e70a13ab914daad92b
SHA256533356878de81f8528ae44f4f4be904ef24f7fac3b153797a0ee72ac59d825e6
SHA51253b921ff6af6ebeaf932e4d18872c4a6dd70ee82edaae20b4559393a055403d207adf46db9b8246cc4abbaba74972b90acbb607700a2c30f033c3c4c49d4e723