Overview
overview
9Static
static
3155绿色�...��.url
windows7-x64
1155绿色�...��.url
windows10-2004-x64
1RemoveWate...64.exe
windows7-x64
1RemoveWate...64.exe
windows10-2004-x64
1TCPZ_Overview.CHS.htm
windows7-x64
3TCPZ_Overview.CHS.htm
windows10-2004-x64
3TCPZ_Overview.ENU.htm
windows7-x64
3TCPZ_Overview.ENU.htm
windows10-2004-x64
3TCPZ_Overview.ITA.htm
windows7-x64
3TCPZ_Overview.ITA.htm
windows10-2004-x64
1tcpz.exe
windows7-x64
9tcpz.exe
windows10-2004-x64
9tcpz64.exe
windows7-x64
9tcpz64.exe
windows10-2004-x64
9Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RemoveWatermarkX64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RemoveWatermarkX64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
TCPZ_Overview.CHS.htm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
TCPZ_Overview.CHS.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
TCPZ_Overview.ENU.htm
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
TCPZ_Overview.ENU.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
TCPZ_Overview.ITA.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
TCPZ_Overview.ITA.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tcpz.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tcpz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tcpz64.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
tcpz64.exe
Resource
win10v2004-20240802-en
General
-
Target
tcpz64.exe
-
Size
737KB
-
MD5
7368655a99d81b2b2ae2e13765421313
-
SHA1
6b8144df8ce9f6566ec6fff77844c2622ba45b22
-
SHA256
aa3688a07bfbe5df55d5fc26d5ace38d48c9882d5038df4b91c85cadac02584c
-
SHA512
c63886f057869e677af01c63f7cdc82d78c271dc77277c4fad744df0be35b694be6eb653f907aa2f0c0d0e83a3e7440ae9ef4e4b98244a9545a11e40609e0c89
-
SSDEEP
6144:u+S9Re4T87LZcOXp6O1+MhUdMhOHHw59Kmlxf0Y8P0oH9EQZJLLaTu6yVAuPa9bO:DSW4gZ6+Xf0oQLL6yY9Cokf
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 2840 bcdedit.exe -
Enables test signing to bypass driver trust controls 1 TTPs 1 IoCs
Allows any signed driver to load without validation against a trusted certificate authority.
pid Process 2840 bcdedit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 tcpz64.exe 2144 tcpz64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2840 2144 tcpz64.exe 30 PID 2144 wrote to memory of 2840 2144 tcpz64.exe 30 PID 2144 wrote to memory of 2840 2144 tcpz64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\tcpz64.exe"C:\Users\Admin\AppData\Local\Temp\tcpz64.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" -set TESTSIGNING ON2⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110B
MD5419f1082bacb71e29bde91be7391b18f
SHA1fa613ba2e627181aa297b5e70a13ab914daad92b
SHA256533356878de81f8528ae44f4f4be904ef24f7fac3b153797a0ee72ac59d825e6
SHA51253b921ff6af6ebeaf932e4d18872c4a6dd70ee82edaae20b4559393a055403d207adf46db9b8246cc4abbaba74972b90acbb607700a2c30f033c3c4c49d4e723