Analysis
-
max time kernel
448s -
max time network
440s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 17:17
Static task
static1
Behavioral task
behavioral1
Sample
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe
Resource
win10v2004-20230220-en
General
-
Target
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe
-
Size
154KB
-
MD5
5e867ae4a78726523d91eaea386fce6d
-
SHA1
c9ee64774b15ada9cbd52f88bb47057647978fac
-
SHA256
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d
-
SHA512
74d7fbb706839e32432abb761dbb02dd0e3d85e8f2f22412549d379f42027a99c4af39febb448b150e6d701d25fab4be698eb9439bcb5a247659dbf888bbb344
-
SSDEEP
1536:n9Hnxm+W0eDrB6CjnMQSoWp0MYS3+MpHiCUywyJqbgoVtcdnA+QA5Hs5W0+MWVO4:npQDBDjnLSZp3+6iCUyw6oVtrA5He1
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\koplspzc\ImagePath = "C:\\Windows\\SysWOW64\\koplspzc\\qyrhmjbl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe -
Executes dropped EXE 1 IoCs
Processes:
qyrhmjbl.exepid process 3908 qyrhmjbl.exe -
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qyrhmjbl.exedescription pid process target process PID 3908 set thread context of 4940 3908 qyrhmjbl.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2528 sc.exe 4192 sc.exe 1100 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 6 IoCs
Processes:
explorer.exemspaint.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 3088 mspaint.exe 3088 mspaint.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
mspaint.exeOpenWith.exepid process 3088 mspaint.exe 4472 OpenWith.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exeqyrhmjbl.exedescription pid process target process PID 3476 wrote to memory of 1216 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 1216 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 1216 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 780 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 780 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 780 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe cmd.exe PID 3476 wrote to memory of 2528 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 2528 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 2528 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 4192 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 4192 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 4192 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 1100 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 1100 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 1100 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe sc.exe PID 3476 wrote to memory of 3840 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe netsh.exe PID 3476 wrote to memory of 3840 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe netsh.exe PID 3476 wrote to memory of 3840 3476 78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe netsh.exe PID 3908 wrote to memory of 4940 3908 qyrhmjbl.exe svchost.exe PID 3908 wrote to memory of 4940 3908 qyrhmjbl.exe svchost.exe PID 3908 wrote to memory of 4940 3908 qyrhmjbl.exe svchost.exe PID 3908 wrote to memory of 4940 3908 qyrhmjbl.exe svchost.exe PID 3908 wrote to memory of 4940 3908 qyrhmjbl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\koplspzc\2⤵PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qyrhmjbl.exe" C:\Windows\SysWOW64\koplspzc\2⤵PID:780
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create koplspzc binPath= "C:\Windows\SysWOW64\koplspzc\qyrhmjbl.exe /d\"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description koplspzc "wifi internet conection"2⤵
- Launches sc.exe
PID:4192
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start koplspzc2⤵
- Launches sc.exe
PID:1100
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3840
-
-
C:\Windows\SysWOW64\koplspzc\qyrhmjbl.exeC:\Windows\SysWOW64\koplspzc\qyrhmjbl.exe /d"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:4940
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4540
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1800
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3128
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\OptimizeEnter.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:1560
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.6MB
MD5b6f6c0d91799f827dd0a61a08d167f3b
SHA1b11fb9ba718fbd7a02e048fb2247f12c551e2ca4
SHA2568a100743e736069c41ab1507f67dbea09179446995b1e85040683e508e4d526d
SHA512ed7f30f3b9d97e830b560855b0d9c4e442f0876745f46044943eb400ac248784333f4cdb2b1dafffaa2b1be8348624c056fab02e6df343a7d9b7f7aaeee40fc6
-
Filesize
14.6MB
MD5b6f6c0d91799f827dd0a61a08d167f3b
SHA1b11fb9ba718fbd7a02e048fb2247f12c551e2ca4
SHA2568a100743e736069c41ab1507f67dbea09179446995b1e85040683e508e4d526d
SHA512ed7f30f3b9d97e830b560855b0d9c4e442f0876745f46044943eb400ac248784333f4cdb2b1dafffaa2b1be8348624c056fab02e6df343a7d9b7f7aaeee40fc6