Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe
Resource
win10v2004-20231023-en
General
-
Target
189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe
-
Size
11.7MB
-
MD5
0b9eaf5502101f33252e46846f4db5a5
-
SHA1
620b46abbe9d9e3884d28d85fe7b949c17538eda
-
SHA256
189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232
-
SHA512
23fda346f08da77d3158d0a9c464a382af17c9a5649ed4b89152dec01d2527ec0cb9f6d43d5b8decf7ebcf0d65e0906f69a2443e72605c4eb7f549a004ce378c
-
SSDEEP
3072:x8NYa2qJjULtTNupQyEC6pxhhfm5OcVi:xsRItTNKr2f45
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\btlvfany = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2612 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\btlvfany\ImagePath = "C:\\Windows\\SysWOW64\\btlvfany\\zpvopxnw.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2660 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 zpvopxnw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2660 2532 zpvopxnw.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2116 sc.exe 2732 sc.exe 2672 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2928 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 28 PID 2876 wrote to memory of 2928 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 28 PID 2876 wrote to memory of 2928 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 28 PID 2876 wrote to memory of 2928 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 28 PID 2876 wrote to memory of 2952 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 30 PID 2876 wrote to memory of 2952 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 30 PID 2876 wrote to memory of 2952 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 30 PID 2876 wrote to memory of 2952 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 30 PID 2876 wrote to memory of 2116 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 32 PID 2876 wrote to memory of 2116 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 32 PID 2876 wrote to memory of 2116 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 32 PID 2876 wrote to memory of 2116 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 32 PID 2876 wrote to memory of 2732 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 34 PID 2876 wrote to memory of 2732 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 34 PID 2876 wrote to memory of 2732 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 34 PID 2876 wrote to memory of 2732 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 34 PID 2876 wrote to memory of 2672 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 36 PID 2876 wrote to memory of 2672 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 36 PID 2876 wrote to memory of 2672 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 36 PID 2876 wrote to memory of 2672 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 36 PID 2876 wrote to memory of 2612 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 38 PID 2876 wrote to memory of 2612 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 38 PID 2876 wrote to memory of 2612 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 38 PID 2876 wrote to memory of 2612 2876 189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe 38 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41 PID 2532 wrote to memory of 2660 2532 zpvopxnw.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe"C:\Users\Admin\AppData\Local\Temp\189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\btlvfany\2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zpvopxnw.exe" C:\Windows\SysWOW64\btlvfany\2⤵PID:2952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create btlvfany binPath= "C:\Windows\SysWOW64\btlvfany\zpvopxnw.exe /d\"C:\Users\Admin\AppData\Local\Temp\189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description btlvfany "wifi internet conection"2⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start btlvfany2⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2612
-
-
C:\Windows\SysWOW64\btlvfany\zpvopxnw.exeC:\Windows\SysWOW64\btlvfany\zpvopxnw.exe /d"C:\Users\Admin\AppData\Local\Temp\189c5efc65e3b28e3536ffb8616766b36115b058ceb6548c87bb3e4d3a5e0232.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD599883f479cb7ba2b7c19d7651ac01070
SHA11b8b5346dab5d12d3e342a742cebec6ea016688f
SHA256e1647eba7b34bf8c31a7901293e17d1bb4846f38443587280fb810ffa4055950
SHA51299554c07675293901d75ff388fb6d6b44bb0e0c0b1af9a1c8f1e20f89e5edbd9595e69ae04c33da727575f818fae049f0edcf82da911cf8ba820f1f2a0b4e6d9
-
Filesize
10.8MB
MD599883f479cb7ba2b7c19d7651ac01070
SHA11b8b5346dab5d12d3e342a742cebec6ea016688f
SHA256e1647eba7b34bf8c31a7901293e17d1bb4846f38443587280fb810ffa4055950
SHA51299554c07675293901d75ff388fb6d6b44bb0e0c0b1af9a1c8f1e20f89e5edbd9595e69ae04c33da727575f818fae049f0edcf82da911cf8ba820f1f2a0b4e6d9