Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
02a6d9f2a8ddc0e12270e8b39b2255e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02a6d9f2a8ddc0e12270e8b39b2255e3.exe
Resource
win10v2004-20231215-en
General
-
Target
02a6d9f2a8ddc0e12270e8b39b2255e3.exe
-
Size
12.3MB
-
MD5
02a6d9f2a8ddc0e12270e8b39b2255e3
-
SHA1
d280cf802d5548da4b59a2d7fa4d3d7cf434dac5
-
SHA256
936ba202d93326862cec01d25e4092511f2362416ccf068d0f54b344cab20064
-
SHA512
729f4775b7c8381df1a4b620551672893c9c736216482712ef25d849eea4b691b42ad6b3a6654779346748a066bfc8135471bd2c6581f6fea81be18251f72ce1
-
SSDEEP
49152:kvVGWdbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb:kvV
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4036 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zxipdrks\ImagePath = "C:\\Windows\\SysWOW64\\zxipdrks\\jfxvdmph.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 02a6d9f2a8ddc0e12270e8b39b2255e3.exe -
Deletes itself 1 IoCs
pid Process 3456 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 jfxvdmph.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4988 set thread context of 3456 4988 jfxvdmph.exe 111 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1044 sc.exe 960 sc.exe 5024 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2200 5100 WerFault.exe 87 448 4988 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3740 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 91 PID 5100 wrote to memory of 3740 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 91 PID 5100 wrote to memory of 3740 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 91 PID 5100 wrote to memory of 632 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 92 PID 5100 wrote to memory of 632 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 92 PID 5100 wrote to memory of 632 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 92 PID 5100 wrote to memory of 960 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 95 PID 5100 wrote to memory of 960 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 95 PID 5100 wrote to memory of 960 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 95 PID 5100 wrote to memory of 5024 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 97 PID 5100 wrote to memory of 5024 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 97 PID 5100 wrote to memory of 5024 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 97 PID 5100 wrote to memory of 1044 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 98 PID 5100 wrote to memory of 1044 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 98 PID 5100 wrote to memory of 1044 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 98 PID 5100 wrote to memory of 4036 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 101 PID 5100 wrote to memory of 4036 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 101 PID 5100 wrote to memory of 4036 5100 02a6d9f2a8ddc0e12270e8b39b2255e3.exe 101 PID 4988 wrote to memory of 3456 4988 jfxvdmph.exe 111 PID 4988 wrote to memory of 3456 4988 jfxvdmph.exe 111 PID 4988 wrote to memory of 3456 4988 jfxvdmph.exe 111 PID 4988 wrote to memory of 3456 4988 jfxvdmph.exe 111 PID 4988 wrote to memory of 3456 4988 jfxvdmph.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a6d9f2a8ddc0e12270e8b39b2255e3.exe"C:\Users\Admin\AppData\Local\Temp\02a6d9f2a8ddc0e12270e8b39b2255e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zxipdrks\2⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jfxvdmph.exe" C:\Windows\SysWOW64\zxipdrks\2⤵PID:632
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zxipdrks binPath= "C:\Windows\SysWOW64\zxipdrks\jfxvdmph.exe /d\"C:\Users\Admin\AppData\Local\Temp\02a6d9f2a8ddc0e12270e8b39b2255e3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:960
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zxipdrks "wifi internet conection"2⤵
- Launches sc.exe
PID:5024
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zxipdrks2⤵
- Launches sc.exe
PID:1044
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 12722⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\zxipdrks\jfxvdmph.exeC:\Windows\SysWOW64\zxipdrks\jfxvdmph.exe /d"C:\Users\Admin\AppData\Local\Temp\02a6d9f2a8ddc0e12270e8b39b2255e3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5162⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5100 -ip 51001⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4988 -ip 49881⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.7MB
MD5f0bf21b9eed8de0b3bc74e7250c0abb4
SHA1ab5bbae3414d6722471d2bda6498f4f770a34e6d
SHA2563f11afbe0d9b91aeec98b380793bbb57e1a843e990bb2df93b022d3b88e9a461
SHA512590f2d7a51afe80bce3640089fe21b951315558ae9bf5cb70ea01e8670b0318cf998a8b3e693fd54ca05e9ea73821fda77f29121b978181574eea16f44fd35b0
-
Filesize
8.2MB
MD5990cdd4aadd3ed9f960ab69c05011bdc
SHA1b41fd1e01693775f2148bf43907321852fcd83c8
SHA256a04b573ee134c5c0a7262989cac4378f133e673dbc7bb4f5c4a9fa701b16153d
SHA512fc406b3bed6a05d7d8ec45712ff986154a544d02fc0ee72ebfdb3f70ba46621f849210640eaea3467810ce705151ee95e3fcbbba987cc789f896ad9af124fae1