Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe
Resource
win10v2004-20220414-en
General
-
Target
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe
-
Size
114KB
-
MD5
a01320aeca43cc1846139e6db2caffd4
-
SHA1
df9ac1de1f02265fe1a88206e2ef5ec70c60890f
-
SHA256
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1
-
SHA512
26ad00b80514b40130e4ce6574688864a54371261040a3ddaf2ea1b9b6548cf64b14f3020e21583bee9f4f39f3ab45a5742f613d2a152e33c51f43467f7d3cf6
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\xggiydyu = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
kgagmogx.exepid process 864 kgagmogx.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\xggiydyu\ImagePath = "C:\\Windows\\SysWOW64\\xggiydyu\\kgagmogx.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1672 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kgagmogx.exedescription pid process target process PID 864 set thread context of 1672 864 kgagmogx.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 920 sc.exe 1808 sc.exe 1096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exekgagmogx.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier kgagmogx.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exekgagmogx.exedescription pid process target process PID 1352 wrote to memory of 976 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 976 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 976 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 976 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 1452 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 1452 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 1452 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 1452 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe cmd.exe PID 1352 wrote to memory of 1808 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1808 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1808 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1808 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1096 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1096 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1096 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1096 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 920 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 920 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 920 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 920 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe sc.exe PID 1352 wrote to memory of 1216 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe netsh.exe PID 1352 wrote to memory of 1216 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe netsh.exe PID 1352 wrote to memory of 1216 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe netsh.exe PID 1352 wrote to memory of 1216 1352 3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe netsh.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe PID 864 wrote to memory of 1672 864 kgagmogx.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe"C:\Users\Admin\AppData\Local\Temp\3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\xggiydyu\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kgagmogx.exe" C:\Windows\SysWOW64\xggiydyu\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create xggiydyu binPath= "C:\Windows\SysWOW64\xggiydyu\kgagmogx.exe /d\"C:\Users\Admin\AppData\Local\Temp\3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description xggiydyu "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xggiydyu2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\xggiydyu\kgagmogx.exeC:\Windows\SysWOW64\xggiydyu\kgagmogx.exe /d"C:\Users\Admin\AppData\Local\Temp\3c9223d92c40760077983ab7eeb7509d92ec5400ef0c26151021dda113ce27d1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\kgagmogx.exeFilesize
12.6MB
MD5a392c7cd4c9b74886424f05dd690c07a
SHA17c52d3e1dc390cc1087029a0a6fc8e1542d6fde9
SHA25631c38b94227022cf140930f279a34d036c79a28887253063fc0ee6a46d7633a2
SHA512c2bf52f88e8d2635695a38fd48cb2e8244d4405bd88597ec1c7f61190221683fce2a26fd313b5fb45e29a32de967e73c04b00f4a02377b329c037f8deeaaecbd
-
C:\Windows\SysWOW64\xggiydyu\kgagmogx.exeFilesize
12.6MB
MD5a392c7cd4c9b74886424f05dd690c07a
SHA17c52d3e1dc390cc1087029a0a6fc8e1542d6fde9
SHA25631c38b94227022cf140930f279a34d036c79a28887253063fc0ee6a46d7633a2
SHA512c2bf52f88e8d2635695a38fd48cb2e8244d4405bd88597ec1c7f61190221683fce2a26fd313b5fb45e29a32de967e73c04b00f4a02377b329c037f8deeaaecbd
-
memory/864-64-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/920-61-0x0000000000000000-mapping.dmp
-
memory/976-56-0x0000000000000000-mapping.dmp
-
memory/1096-60-0x0000000000000000-mapping.dmp
-
memory/1216-62-0x0000000000000000-mapping.dmp
-
memory/1352-54-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1352-55-0x0000000076241000-0x0000000076243000-memory.dmpFilesize
8KB
-
memory/1452-57-0x0000000000000000-mapping.dmp
-
memory/1672-66-0x00000000000D0000-0x00000000000E5000-memory.dmpFilesize
84KB
-
memory/1672-68-0x00000000000D0000-0x00000000000E5000-memory.dmpFilesize
84KB
-
memory/1672-69-0x00000000000D9A6B-mapping.dmp
-
memory/1672-72-0x00000000000D0000-0x00000000000E5000-memory.dmpFilesize
84KB
-
memory/1672-73-0x00000000000D0000-0x00000000000E5000-memory.dmpFilesize
84KB
-
memory/1672-75-0x00000000000D0000-0x00000000000E5000-memory.dmpFilesize
84KB
-
memory/1808-59-0x0000000000000000-mapping.dmp