Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe
Resource
win10v2004-20231020-en
General
-
Target
1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe
-
Size
10.9MB
-
MD5
3b4ec4dce6bbf75afbcae31112bc54a1
-
SHA1
084e1cdc66b1eed1a8dd37391ff4c5a6239e5267
-
SHA256
1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a
-
SHA512
566d098f0bbad9eea09a06e89d97de6a0e46f101d06ddf3bf6ce5506d0dcbd1388a4e7c3ca6ca54045b83cb1a1c961a58206c2bee68d1ada9c3b71146d1f2452
-
SSDEEP
3072:9AS2oAKtZZy2m4zRwhIuGi9Pf2AG/7999999999999999999999999999999999T:9A7KtDyv4lwh7S
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\wzjfllwu = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2500 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wzjfllwu\ImagePath = "C:\\Windows\\SysWOW64\\wzjfllwu\\fiqqomqz.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2660 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 fiqqomqz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 2660 2520 fiqqomqz.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1176 sc.exe 2704 sc.exe 2920 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2892 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 28 PID 2164 wrote to memory of 2892 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 28 PID 2164 wrote to memory of 2892 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 28 PID 2164 wrote to memory of 2892 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 28 PID 2164 wrote to memory of 2308 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 30 PID 2164 wrote to memory of 2308 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 30 PID 2164 wrote to memory of 2308 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 30 PID 2164 wrote to memory of 2308 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 30 PID 2164 wrote to memory of 2704 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 32 PID 2164 wrote to memory of 2704 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 32 PID 2164 wrote to memory of 2704 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 32 PID 2164 wrote to memory of 2704 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 32 PID 2164 wrote to memory of 2920 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 34 PID 2164 wrote to memory of 2920 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 34 PID 2164 wrote to memory of 2920 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 34 PID 2164 wrote to memory of 2920 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 34 PID 2164 wrote to memory of 1176 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 36 PID 2164 wrote to memory of 1176 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 36 PID 2164 wrote to memory of 1176 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 36 PID 2164 wrote to memory of 1176 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 36 PID 2164 wrote to memory of 2500 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 38 PID 2164 wrote to memory of 2500 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 38 PID 2164 wrote to memory of 2500 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 38 PID 2164 wrote to memory of 2500 2164 1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe 38 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41 PID 2520 wrote to memory of 2660 2520 fiqqomqz.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe"C:\Users\Admin\AppData\Local\Temp\1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wzjfllwu\2⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fiqqomqz.exe" C:\Windows\SysWOW64\wzjfllwu\2⤵PID:2308
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wzjfllwu binPath= "C:\Windows\SysWOW64\wzjfllwu\fiqqomqz.exe /d\"C:\Users\Admin\AppData\Local\Temp\1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wzjfllwu "wifi internet conection"2⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wzjfllwu2⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2500
-
-
C:\Windows\SysWOW64\wzjfllwu\fiqqomqz.exeC:\Windows\SysWOW64\wzjfllwu\fiqqomqz.exe /d"C:\Users\Admin\AppData\Local\Temp\1971f29dbe7038f50552cff2c3a56ab15f941bcd90bea3404961f109eb77360a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5646d65e502c609cc73c98c21371c79e1
SHA1ea8137ded6cf91b395dd3eb592de37d190352396
SHA256bb5b0387a4d615970e57f7aaa38b501a975872bb54f1306d1917b772cb6759c2
SHA512163670ee363208e4eba820871cfc82c8448d1b4bd61bcf705512659c1a703abe8ef8f89e333a16487a7c4406fc56b6f7326f69b9144e33dc1843a73aae33bd55
-
Filesize
10.3MB
MD5646d65e502c609cc73c98c21371c79e1
SHA1ea8137ded6cf91b395dd3eb592de37d190352396
SHA256bb5b0387a4d615970e57f7aaa38b501a975872bb54f1306d1917b772cb6759c2
SHA512163670ee363208e4eba820871cfc82c8448d1b4bd61bcf705512659c1a703abe8ef8f89e333a16487a7c4406fc56b6f7326f69b9144e33dc1843a73aae33bd55