Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 00:03
Static task
static1
Behavioral task
behavioral1
Sample
23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe
Resource
win10v2004-20220414-en
General
-
Target
23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe
-
Size
98KB
-
MD5
e7108d1c5bbdb323e604f85f9293c3bb
-
SHA1
ed59cb4f3d4ce8e98e638954e610f57d036cbf5e
-
SHA256
23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe
-
SHA512
1fd5f4d92e940d2db3003b77668e5cc5227e9c4b43ef2baaf882157876337d47bb964e8eefa37db1d20dd9c712f508e8ab015d73bd7932c8b86a494f1d8f54e9
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\bxfzsnda = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
yxnjqmr.exepid process 1376 yxnjqmr.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bxfzsnda\ImagePath = "C:\\Windows\\SysWOW64\\bxfzsnda\\yxnjqmr.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1612 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
yxnjqmr.exedescription pid process target process PID 1376 set thread context of 1612 1376 yxnjqmr.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1280 sc.exe 2028 sc.exe 1816 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exeyxnjqmr.exedescription pid process target process PID 748 wrote to memory of 1340 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 1340 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 1340 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 1340 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 952 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 952 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 952 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 952 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe cmd.exe PID 748 wrote to memory of 1280 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1280 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1280 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1280 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 2028 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 2028 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 2028 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 2028 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1816 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1816 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1816 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1816 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe sc.exe PID 748 wrote to memory of 1384 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe netsh.exe PID 748 wrote to memory of 1384 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe netsh.exe PID 748 wrote to memory of 1384 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe netsh.exe PID 748 wrote to memory of 1384 748 23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe netsh.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe PID 1376 wrote to memory of 1612 1376 yxnjqmr.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe"C:\Users\Admin\AppData\Local\Temp\23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bxfzsnda\2⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yxnjqmr.exe" C:\Windows\SysWOW64\bxfzsnda\2⤵PID:952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bxfzsnda binPath= "C:\Windows\SysWOW64\bxfzsnda\yxnjqmr.exe /d\"C:\Users\Admin\AppData\Local\Temp\23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1280
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bxfzsnda "wifi internet conection"2⤵
- Launches sc.exe
PID:2028
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bxfzsnda2⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1384
-
-
C:\Windows\SysWOW64\bxfzsnda\yxnjqmr.exeC:\Windows\SysWOW64\bxfzsnda\yxnjqmr.exe /d"C:\Users\Admin\AppData\Local\Temp\23e4f36a53a03c4b9bc31c8bb8a6eb2a9647ec8b2ba5b4d8dccf4f80b6ff9abe.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.4MB
MD5a424155b5a746c6dde06adc599f43355
SHA12fe194c08c07c3623a400c9e1fdeb3bc35cca21e
SHA2569271fa27f5358ff1f6242e3f10bf483155697f6e6e9d1be5e963db838aa20ba3
SHA5121f478b10eb46df1a68dd10840350e2d85fcfec24a7c64536564d590ff76b4c88d40081cd1b1355652474272b4d70f3674801acc4aacc0147cba76408f6337b97
-
Filesize
12.4MB
MD5a424155b5a746c6dde06adc599f43355
SHA12fe194c08c07c3623a400c9e1fdeb3bc35cca21e
SHA2569271fa27f5358ff1f6242e3f10bf483155697f6e6e9d1be5e963db838aa20ba3
SHA5121f478b10eb46df1a68dd10840350e2d85fcfec24a7c64536564d590ff76b4c88d40081cd1b1355652474272b4d70f3674801acc4aacc0147cba76408f6337b97