Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
1c0a51e46a97e39af8c7f2d756563035.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c0a51e46a97e39af8c7f2d756563035.exe
Resource
win10v2004-20231215-en
General
-
Target
1c0a51e46a97e39af8c7f2d756563035.exe
-
Size
14.8MB
-
MD5
1c0a51e46a97e39af8c7f2d756563035
-
SHA1
937759508af670d83b558012cfd57d90a7570755
-
SHA256
bc933a99a23308afd8537adc4da5ccefa080eaaf26c31b1e9a804f557ba258c7
-
SHA512
ebbb6969eb48bf2ce1eb8fa8eef358861aadf2505d45042050c27586366cd9df74323491f6966cc8d4f7a5695dd6fe8659750834479a57ec60b7a9f6a9c981ad
-
SSDEEP
49152:SkVuhFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFP:Sk
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2416 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dxgmfkxq\ImagePath = "C:\\Windows\\SysWOW64\\dxgmfkxq\\khecozoc.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 1c0a51e46a97e39af8c7f2d756563035.exe -
Deletes itself 1 IoCs
pid Process 4884 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4948 khecozoc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4948 set thread context of 4884 4948 khecozoc.exe 112 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2012 sc.exe 2548 sc.exe 3760 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1892 4948 WerFault.exe 107 3552 1224 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1224 wrote to memory of 452 1224 1c0a51e46a97e39af8c7f2d756563035.exe 95 PID 1224 wrote to memory of 452 1224 1c0a51e46a97e39af8c7f2d756563035.exe 95 PID 1224 wrote to memory of 452 1224 1c0a51e46a97e39af8c7f2d756563035.exe 95 PID 1224 wrote to memory of 4988 1224 1c0a51e46a97e39af8c7f2d756563035.exe 97 PID 1224 wrote to memory of 4988 1224 1c0a51e46a97e39af8c7f2d756563035.exe 97 PID 1224 wrote to memory of 4988 1224 1c0a51e46a97e39af8c7f2d756563035.exe 97 PID 1224 wrote to memory of 2012 1224 1c0a51e46a97e39af8c7f2d756563035.exe 100 PID 1224 wrote to memory of 2012 1224 1c0a51e46a97e39af8c7f2d756563035.exe 100 PID 1224 wrote to memory of 2012 1224 1c0a51e46a97e39af8c7f2d756563035.exe 100 PID 1224 wrote to memory of 2548 1224 1c0a51e46a97e39af8c7f2d756563035.exe 102 PID 1224 wrote to memory of 2548 1224 1c0a51e46a97e39af8c7f2d756563035.exe 102 PID 1224 wrote to memory of 2548 1224 1c0a51e46a97e39af8c7f2d756563035.exe 102 PID 1224 wrote to memory of 3760 1224 1c0a51e46a97e39af8c7f2d756563035.exe 105 PID 1224 wrote to memory of 3760 1224 1c0a51e46a97e39af8c7f2d756563035.exe 105 PID 1224 wrote to memory of 3760 1224 1c0a51e46a97e39af8c7f2d756563035.exe 105 PID 1224 wrote to memory of 2416 1224 1c0a51e46a97e39af8c7f2d756563035.exe 109 PID 1224 wrote to memory of 2416 1224 1c0a51e46a97e39af8c7f2d756563035.exe 109 PID 1224 wrote to memory of 2416 1224 1c0a51e46a97e39af8c7f2d756563035.exe 109 PID 4948 wrote to memory of 4884 4948 khecozoc.exe 112 PID 4948 wrote to memory of 4884 4948 khecozoc.exe 112 PID 4948 wrote to memory of 4884 4948 khecozoc.exe 112 PID 4948 wrote to memory of 4884 4948 khecozoc.exe 112 PID 4948 wrote to memory of 4884 4948 khecozoc.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0a51e46a97e39af8c7f2d756563035.exe"C:\Users\Admin\AppData\Local\Temp\1c0a51e46a97e39af8c7f2d756563035.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dxgmfkxq\2⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\khecozoc.exe" C:\Windows\SysWOW64\dxgmfkxq\2⤵PID:4988
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dxgmfkxq binPath= "C:\Windows\SysWOW64\dxgmfkxq\khecozoc.exe /d\"C:\Users\Admin\AppData\Local\Temp\1c0a51e46a97e39af8c7f2d756563035.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dxgmfkxq "wifi internet conection"2⤵
- Launches sc.exe
PID:2548
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dxgmfkxq2⤵
- Launches sc.exe
PID:3760
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 13082⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\dxgmfkxq\khecozoc.exeC:\Windows\SysWOW64\dxgmfkxq\khecozoc.exe /d"C:\Users\Admin\AppData\Local\Temp\1c0a51e46a97e39af8c7f2d756563035.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2202⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4948 -ip 49481⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1224 -ip 12241⤵PID:648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD54b665e63bc3f01a4167aa4aeac6f6910
SHA116e402b2acb49ba7199cdc86b66b55834c66395f
SHA256d408c9e69b40dc32c244cd10493816350eebbac0d199c8cf756faac911371483
SHA512c77e7b6043fb3882f23af9753a2acedbf07adf074ffafb87b5e1252a27516a496023ac737c9899a6cef6b998190caf1a1de3b8f8bc597f5a65c643d5ab54fd08
-
Filesize
11.8MB
MD5e119825255e138b1fa9426876ce97c1a
SHA15b84e609dacadbb157215d5d0f646d15e0b6e5b4
SHA2561563644ece51748ad4799ee1ec4762251b64ade3269a7f0aa6d6af7d82f50125
SHA512cd0dffec02452cd4241c9192bae559bca861ccbabfb3f7f6b4924530d4674d59f6aff0befa3b4881c678e4fcd8c6c726188c95eb29bffe33807d3daaa3e57ff2