Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:28

General

  • Target

    tcpz.exe

  • Size

    421KB

  • MD5

    11d94b8c08add90829ea2b2c6d68bb76

  • SHA1

    d1f3dd48835f67172b7f77ec07f8e30b713b149e

  • SHA256

    2ad20c26380b36a0b9ff0e5d346a1b92c15c28f89e7e49e752f4432aa906e75d

  • SHA512

    462146ba5e017c2ec5933529ae95933c6d965ac41ede574f6e48038e8326924ea696f8a9686b463e12e6cf0827c4f55f4116fb7fdba1f74fdf2d465bb6c4a57c

  • SSDEEP

    3072:le/2TCkMuN/+vBEVSNBF6lib/yTmKy5OpeQwrIk8avRsX37EWbNuSQtAOZvszIcu:lAaN/+52SNBQ+yTm40Db+GdDTiblvE

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Enables test signing to bypass driver trust controls 1 TTPs 1 IoCs

    Allows any signed driver to load without validation against a trusted certificate authority.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tcpz.exe
    "C:\Users\Admin\AppData\Local\Temp\tcpz.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\System32\bcdedit.exe
      "C:\Windows\System32\bcdedit.exe" -set TESTSIGNING ON
      2⤵
      • Modifies boot configuration data using bcdedit
      • Enables test signing to bypass driver trust controls
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tcpz.ini

    Filesize

    110B

    MD5

    419f1082bacb71e29bde91be7391b18f

    SHA1

    fa613ba2e627181aa297b5e70a13ab914daad92b

    SHA256

    533356878de81f8528ae44f4f4be904ef24f7fac3b153797a0ee72ac59d825e6

    SHA512

    53b921ff6af6ebeaf932e4d18872c4a6dd70ee82edaae20b4559393a055403d207adf46db9b8246cc4abbaba74972b90acbb607700a2c30f033c3c4c49d4e723