Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe
Resource
win10v2004-20231020-en
General
-
Target
2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe
-
Size
11.9MB
-
MD5
dbc4c254ab5fd77f0be8a8a08261ca49
-
SHA1
4dfb89d495a3b568e7c2f1b36c69ca1cefaffc4d
-
SHA256
2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5
-
SHA512
952b2f3238494895eb2de48c8005eb7489024361f4601590b1a9e62e8594698ab957ab292dfd7969d8234e03cfb480194f1b7dd37e814a23ecf19d3e39c67edf
-
SSDEEP
3072:c8X2oAKtZZy2m4zRwhIuGikP32xGe7pppppppppppppppppppppppppppppppppr:c8mKtDyv4lwh8W
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\fyfkqnsx = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2772 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fyfkqnsx\ImagePath = "C:\\Windows\\SysWOW64\\fyfkqnsx\\bxrxdfxo.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2528 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 bxrxdfxo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2604 set thread context of 2528 2604 bxrxdfxo.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2852 sc.exe 2700 sc.exe 2640 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2912 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 28 PID 2280 wrote to memory of 2912 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 28 PID 2280 wrote to memory of 2912 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 28 PID 2280 wrote to memory of 2912 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 28 PID 2280 wrote to memory of 2976 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 30 PID 2280 wrote to memory of 2976 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 30 PID 2280 wrote to memory of 2976 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 30 PID 2280 wrote to memory of 2976 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 30 PID 2280 wrote to memory of 2852 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 32 PID 2280 wrote to memory of 2852 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 32 PID 2280 wrote to memory of 2852 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 32 PID 2280 wrote to memory of 2852 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 32 PID 2280 wrote to memory of 2700 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 34 PID 2280 wrote to memory of 2700 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 34 PID 2280 wrote to memory of 2700 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 34 PID 2280 wrote to memory of 2700 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 34 PID 2280 wrote to memory of 2640 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 36 PID 2280 wrote to memory of 2640 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 36 PID 2280 wrote to memory of 2640 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 36 PID 2280 wrote to memory of 2640 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 36 PID 2280 wrote to memory of 2772 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 38 PID 2280 wrote to memory of 2772 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 38 PID 2280 wrote to memory of 2772 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 38 PID 2280 wrote to memory of 2772 2280 2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe 38 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41 PID 2604 wrote to memory of 2528 2604 bxrxdfxo.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe"C:\Users\Admin\AppData\Local\Temp\2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fyfkqnsx\2⤵PID:2912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bxrxdfxo.exe" C:\Windows\SysWOW64\fyfkqnsx\2⤵PID:2976
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fyfkqnsx binPath= "C:\Windows\SysWOW64\fyfkqnsx\bxrxdfxo.exe /d\"C:\Users\Admin\AppData\Local\Temp\2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fyfkqnsx "wifi internet conection"2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fyfkqnsx2⤵
- Launches sc.exe
PID:2640
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2772
-
-
C:\Windows\SysWOW64\fyfkqnsx\bxrxdfxo.exeC:\Windows\SysWOW64\fyfkqnsx\bxrxdfxo.exe /d"C:\Users\Admin\AppData\Local\Temp\2c6b75279ea27028b0ab8d89267d946d71351b1b12551916fea44de3768457b5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD5cbbc6ed97747b5be1340bd6c80a1efcb
SHA1864221bcd609d3ed24aeffacf5aa99c0e4a0b605
SHA2562668621271566dbd74ca08aef5fbc2f288f2a92389f274a29d6d62e200a18c8d
SHA5122a62bea5c5ec9ab5689197946c8e46a16e09018aa983ce861b847fa431f6549cb1c729d2de7d74aeaf0806ed836c779400238ba4ff60d3e1511d17947f16f910
-
Filesize
13.2MB
MD5cbbc6ed97747b5be1340bd6c80a1efcb
SHA1864221bcd609d3ed24aeffacf5aa99c0e4a0b605
SHA2562668621271566dbd74ca08aef5fbc2f288f2a92389f274a29d6d62e200a18c8d
SHA5122a62bea5c5ec9ab5689197946c8e46a16e09018aa983ce861b847fa431f6549cb1c729d2de7d74aeaf0806ed836c779400238ba4ff60d3e1511d17947f16f910