Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
2bfe97448f961f9b64400e2ee3731ce5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bfe97448f961f9b64400e2ee3731ce5.exe
Resource
win10v2004-20231215-en
General
-
Target
2bfe97448f961f9b64400e2ee3731ce5.exe
-
Size
11.1MB
-
MD5
2bfe97448f961f9b64400e2ee3731ce5
-
SHA1
9b37b78546fdcab84b1849cb7707675861ceb3f0
-
SHA256
97cdf05ecaca6f4bc5fe05ca83223647d08e4e34ee404894f782922bf8c28695
-
SHA512
5c305a3cdb8ca939876170be2e6988957446ff0ee1dedcf2a760730972d9c798b7ff9171a1613da7c415bf1688efd80285051778a60c174584fa2fb74271c54d
-
SSDEEP
6144:CM0Em6Qk5N3ScccccccccccccccccccccccccccccccccccccccccccccccccccM:sEma
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\dkwfgexq = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2596 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dkwfgexq\ImagePath = "C:\\Windows\\SysWOW64\\dkwfgexq\\yuouacul.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2604 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 yuouacul.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 2604 2872 yuouacul.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2844 sc.exe 2700 sc.exe 2768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2748 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 28 PID 3040 wrote to memory of 2748 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 28 PID 3040 wrote to memory of 2748 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 28 PID 3040 wrote to memory of 2748 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 28 PID 3040 wrote to memory of 2664 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 30 PID 3040 wrote to memory of 2664 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 30 PID 3040 wrote to memory of 2664 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 30 PID 3040 wrote to memory of 2664 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 30 PID 3040 wrote to memory of 2844 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 32 PID 3040 wrote to memory of 2844 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 32 PID 3040 wrote to memory of 2844 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 32 PID 3040 wrote to memory of 2844 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 32 PID 3040 wrote to memory of 2700 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 34 PID 3040 wrote to memory of 2700 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 34 PID 3040 wrote to memory of 2700 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 34 PID 3040 wrote to memory of 2700 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 34 PID 3040 wrote to memory of 2768 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 36 PID 3040 wrote to memory of 2768 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 36 PID 3040 wrote to memory of 2768 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 36 PID 3040 wrote to memory of 2768 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 36 PID 3040 wrote to memory of 2596 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 39 PID 3040 wrote to memory of 2596 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 39 PID 3040 wrote to memory of 2596 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 39 PID 3040 wrote to memory of 2596 3040 2bfe97448f961f9b64400e2ee3731ce5.exe 39 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41 PID 2872 wrote to memory of 2604 2872 yuouacul.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dkwfgexq\2⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yuouacul.exe" C:\Windows\SysWOW64\dkwfgexq\2⤵PID:2664
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dkwfgexq binPath= "C:\Windows\SysWOW64\dkwfgexq\yuouacul.exe /d\"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dkwfgexq "wifi internet conection"2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dkwfgexq2⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2596
-
-
C:\Windows\SysWOW64\dkwfgexq\yuouacul.exeC:\Windows\SysWOW64\dkwfgexq\yuouacul.exe /d"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.9MB
MD58d750b3c3cc8dc4227caac8a0d0e002b
SHA1944706c7b2e0c19e00717a055feced6a45105cfa
SHA2564104b983e44ed1282ee134c9c4adb154ab8eaa567312438bcff1520b6d4e87c1
SHA51272dc679851242d14d6bbacd2e8920547e8f0e9c8fb82f4f759f1f3c3865434e0ebd1b092fa496468c2dec57d8d4d6f9cf8463890529f4fc8ff9fc1322b973d6d
-
Filesize
4.8MB
MD5435dcb2dddbd18f83191b6a5dda100b7
SHA16349971c5173777938ff839ee9350eebe449606b
SHA256a5c77ff4cbacb1a03458129de6ae7dc481f30e3e40b0680337d8a50002a51814
SHA512db324ca73d830fcfdcb9c7d67688930266d4424326c1cb20a3b9d5c3937544b3c23a5452bd57062f8c16f88ab2d63506ae3534313a5bf9c8b260ed31748aca21