Analysis
-
max time kernel
149s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
Resource
win10v2004-20220414-en
General
-
Target
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
-
Size
142KB
-
MD5
70780b64e4a6d98605af8971d4c087ea
-
SHA1
862b12cfea6bf1c5e636f58e8bcdaf89482c94af
-
SHA256
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf
-
SHA512
cbdfdf35c0f31aaf4870709aa07c3c93edf8c5b504d39f44838e9ffc4d7eeee3483e9c3a6c98a92d1fcdbb3e0e585127f0635c535575faa2509f9dbd54ac3950
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
pfjxnjem.exepid process 1948 pfjxnjem.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\healfpvy\ImagePath = "C:\\Windows\\SysWOW64\\healfpvy\\pfjxnjem.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1448 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pfjxnjem.exedescription pid process target process PID 1948 set thread context of 1448 1948 pfjxnjem.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 524 sc.exe 872 sc.exe 1540 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exepfjxnjem.exedescription pid process target process PID 1648 wrote to memory of 1532 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1532 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1532 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1532 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1324 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1324 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1324 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1324 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1648 wrote to memory of 1540 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 1540 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 1540 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 1540 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 524 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 524 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 524 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 524 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 872 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 872 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 872 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 872 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1648 wrote to memory of 1096 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1648 wrote to memory of 1096 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1648 wrote to memory of 1096 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1648 wrote to memory of 1096 1648 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe PID 1948 wrote to memory of 1448 1948 pfjxnjem.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\healfpvy\2⤵PID:1532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pfjxnjem.exe" C:\Windows\SysWOW64\healfpvy\2⤵PID:1324
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create healfpvy binPath= "C:\Windows\SysWOW64\healfpvy\pfjxnjem.exe /d\"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1540
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description healfpvy "wifi internet conection"2⤵
- Launches sc.exe
PID:524
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start healfpvy2⤵
- Launches sc.exe
PID:872
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1096
-
-
C:\Windows\SysWOW64\healfpvy\pfjxnjem.exeC:\Windows\SysWOW64\healfpvy\pfjxnjem.exe /d"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD56da79deee61f0fc7f4d21dbb15ca1163
SHA1cd225a4f7cb3df3069664d18bc21011b630f6c61
SHA256f22435044d6a5f90d08e8f1c3a65b35759784f376d3c4617b6b2b9bdae42d2a4
SHA512b2108ce7070f79e04f68c43f2b336c81c4809ff0970d6d1bcd91f675962794f50fb3ae88fb8ee1027b1845256a170969b71331b6bc412c95f11bffcca6f50917
-
Filesize
11.7MB
MD56da79deee61f0fc7f4d21dbb15ca1163
SHA1cd225a4f7cb3df3069664d18bc21011b630f6c61
SHA256f22435044d6a5f90d08e8f1c3a65b35759784f376d3c4617b6b2b9bdae42d2a4
SHA512b2108ce7070f79e04f68c43f2b336c81c4809ff0970d6d1bcd91f675962794f50fb3ae88fb8ee1027b1845256a170969b71331b6bc412c95f11bffcca6f50917