Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
2bfe97448f961f9b64400e2ee3731ce5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bfe97448f961f9b64400e2ee3731ce5.exe
Resource
win10v2004-20231215-en
General
-
Target
2bfe97448f961f9b64400e2ee3731ce5.exe
-
Size
11.1MB
-
MD5
2bfe97448f961f9b64400e2ee3731ce5
-
SHA1
9b37b78546fdcab84b1849cb7707675861ceb3f0
-
SHA256
97cdf05ecaca6f4bc5fe05ca83223647d08e4e34ee404894f782922bf8c28695
-
SHA512
5c305a3cdb8ca939876170be2e6988957446ff0ee1dedcf2a760730972d9c798b7ff9171a1613da7c415bf1688efd80285051778a60c174584fa2fb74271c54d
-
SSDEEP
6144:CM0Em6Qk5N3ScccccccccccccccccccccccccccccccccccccccccccccccccccM:sEma
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1540 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bywzvmzv\ImagePath = "C:\\Windows\\SysWOW64\\bywzvmzv\\dyfcbyuv.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2bfe97448f961f9b64400e2ee3731ce5.exe -
Deletes itself 1 IoCs
pid Process 952 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 636 dyfcbyuv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 952 636 dyfcbyuv.exe 104 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4896 sc.exe 4040 sc.exe 4324 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3312 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 91 PID 4692 wrote to memory of 3312 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 91 PID 4692 wrote to memory of 3312 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 91 PID 4692 wrote to memory of 3764 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 93 PID 4692 wrote to memory of 3764 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 93 PID 4692 wrote to memory of 3764 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 93 PID 4692 wrote to memory of 4896 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 95 PID 4692 wrote to memory of 4896 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 95 PID 4692 wrote to memory of 4896 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 95 PID 4692 wrote to memory of 4040 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 97 PID 4692 wrote to memory of 4040 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 97 PID 4692 wrote to memory of 4040 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 97 PID 4692 wrote to memory of 4324 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 99 PID 4692 wrote to memory of 4324 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 99 PID 4692 wrote to memory of 4324 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 99 PID 4692 wrote to memory of 1540 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 101 PID 4692 wrote to memory of 1540 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 101 PID 4692 wrote to memory of 1540 4692 2bfe97448f961f9b64400e2ee3731ce5.exe 101 PID 636 wrote to memory of 952 636 dyfcbyuv.exe 104 PID 636 wrote to memory of 952 636 dyfcbyuv.exe 104 PID 636 wrote to memory of 952 636 dyfcbyuv.exe 104 PID 636 wrote to memory of 952 636 dyfcbyuv.exe 104 PID 636 wrote to memory of 952 636 dyfcbyuv.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bywzvmzv\2⤵PID:3312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dyfcbyuv.exe" C:\Windows\SysWOW64\bywzvmzv\2⤵PID:3764
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bywzvmzv binPath= "C:\Windows\SysWOW64\bywzvmzv\dyfcbyuv.exe /d\"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4896
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bywzvmzv "wifi internet conection"2⤵
- Launches sc.exe
PID:4040
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bywzvmzv2⤵
- Launches sc.exe
PID:4324
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1540
-
-
C:\Windows\SysWOW64\bywzvmzv\dyfcbyuv.exeC:\Windows\SysWOW64\bywzvmzv\dyfcbyuv.exe /d"C:\Users\Admin\AppData\Local\Temp\2bfe97448f961f9b64400e2ee3731ce5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:952
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD52ebd294b687bf8fc05ffba5bcb44b57b
SHA1d197c1f4667c0f45aa246e477e8a46c676de061e
SHA2562380f68e91fadad2706481482f4d863cdc50d05d4e0041c47d6c6f0e8db38825
SHA512f79ae974fc18eca543d3ae91dff977d6776ad98fc5ea60ce4e6567d50518dc0de15669abe199efd39fc884a90c1b8b67c031c0fcdb4e99c9694fd38320e4be87