Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
0c1a283b875898c9ce315ca6af4f281b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c1a283b875898c9ce315ca6af4f281b.exe
Resource
win10v2004-20231215-en
General
-
Target
0c1a283b875898c9ce315ca6af4f281b.exe
-
Size
13.4MB
-
MD5
0c1a283b875898c9ce315ca6af4f281b
-
SHA1
77c4cafeed6fa62df677072593f3c3ec8ee95ae3
-
SHA256
a5186d8788910d7091812b8a7db89167ffc09d670d73d5dd9a08287f8cfabb1b
-
SHA512
04f4386034dfe5379af03fd474777c1789b96020804bb191d84a42beab1a37b61380f5ac1566f23283955fd58ac21dd76cf5ac05482a5294f58198c93221234b
-
SSDEEP
49152:anHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:a
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ubluyyil = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2600 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ubluyyil\ImagePath = "C:\\Windows\\SysWOW64\\ubluyyil\\anmrbmsw.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2496 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 anmrbmsw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2496 2696 anmrbmsw.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2340 sc.exe 2564 sc.exe 2660 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2636 2860 0c1a283b875898c9ce315ca6af4f281b.exe 29 PID 2860 wrote to memory of 2636 2860 0c1a283b875898c9ce315ca6af4f281b.exe 29 PID 2860 wrote to memory of 2636 2860 0c1a283b875898c9ce315ca6af4f281b.exe 29 PID 2860 wrote to memory of 2636 2860 0c1a283b875898c9ce315ca6af4f281b.exe 29 PID 2860 wrote to memory of 2320 2860 0c1a283b875898c9ce315ca6af4f281b.exe 31 PID 2860 wrote to memory of 2320 2860 0c1a283b875898c9ce315ca6af4f281b.exe 31 PID 2860 wrote to memory of 2320 2860 0c1a283b875898c9ce315ca6af4f281b.exe 31 PID 2860 wrote to memory of 2320 2860 0c1a283b875898c9ce315ca6af4f281b.exe 31 PID 2860 wrote to memory of 2340 2860 0c1a283b875898c9ce315ca6af4f281b.exe 33 PID 2860 wrote to memory of 2340 2860 0c1a283b875898c9ce315ca6af4f281b.exe 33 PID 2860 wrote to memory of 2340 2860 0c1a283b875898c9ce315ca6af4f281b.exe 33 PID 2860 wrote to memory of 2340 2860 0c1a283b875898c9ce315ca6af4f281b.exe 33 PID 2860 wrote to memory of 2564 2860 0c1a283b875898c9ce315ca6af4f281b.exe 35 PID 2860 wrote to memory of 2564 2860 0c1a283b875898c9ce315ca6af4f281b.exe 35 PID 2860 wrote to memory of 2564 2860 0c1a283b875898c9ce315ca6af4f281b.exe 35 PID 2860 wrote to memory of 2564 2860 0c1a283b875898c9ce315ca6af4f281b.exe 35 PID 2860 wrote to memory of 2660 2860 0c1a283b875898c9ce315ca6af4f281b.exe 37 PID 2860 wrote to memory of 2660 2860 0c1a283b875898c9ce315ca6af4f281b.exe 37 PID 2860 wrote to memory of 2660 2860 0c1a283b875898c9ce315ca6af4f281b.exe 37 PID 2860 wrote to memory of 2660 2860 0c1a283b875898c9ce315ca6af4f281b.exe 37 PID 2860 wrote to memory of 2600 2860 0c1a283b875898c9ce315ca6af4f281b.exe 39 PID 2860 wrote to memory of 2600 2860 0c1a283b875898c9ce315ca6af4f281b.exe 39 PID 2860 wrote to memory of 2600 2860 0c1a283b875898c9ce315ca6af4f281b.exe 39 PID 2860 wrote to memory of 2600 2860 0c1a283b875898c9ce315ca6af4f281b.exe 39 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41 PID 2696 wrote to memory of 2496 2696 anmrbmsw.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c1a283b875898c9ce315ca6af4f281b.exe"C:\Users\Admin\AppData\Local\Temp\0c1a283b875898c9ce315ca6af4f281b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ubluyyil\2⤵PID:2636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\anmrbmsw.exe" C:\Windows\SysWOW64\ubluyyil\2⤵PID:2320
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ubluyyil binPath= "C:\Windows\SysWOW64\ubluyyil\anmrbmsw.exe /d\"C:\Users\Admin\AppData\Local\Temp\0c1a283b875898c9ce315ca6af4f281b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ubluyyil "wifi internet conection"2⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ubluyyil2⤵
- Launches sc.exe
PID:2660
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2600
-
-
C:\Windows\SysWOW64\ubluyyil\anmrbmsw.exeC:\Windows\SysWOW64\ubluyyil\anmrbmsw.exe /d"C:\Users\Admin\AppData\Local\Temp\0c1a283b875898c9ce315ca6af4f281b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55c953c1174737aad49cd65ec0408d806
SHA1738d9b5e81c7c4a1769b6e08fecc9561285825c5
SHA256ed7fdcb499fbcd1fbb5cb178eeb6856de7d16ae6a1c5378922d29f3f1c923ef7
SHA512943e91a3d9103ce7f00b44bd0612002cc34ea92d4f5325b764ca132b054f04eaaf4b2e5cd97ed7e5288ab58843da6a1c06645c1cbd6def214e7e9b35d757cb0f