Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 13:54
Static task
static1
Behavioral task
behavioral1
Sample
2368aa18bcdbe7be7eb90add30b17d35.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2368aa18bcdbe7be7eb90add30b17d35.exe
Resource
win10v2004-20231222-en
General
-
Target
2368aa18bcdbe7be7eb90add30b17d35.exe
-
Size
11.8MB
-
MD5
2368aa18bcdbe7be7eb90add30b17d35
-
SHA1
39952f16bba27c35d4c8825d7ce59e01afc8daae
-
SHA256
5081506feb46f06efc15eb14a7deff7618a7bfbe0a42363c6478540002647c7e
-
SHA512
9d29520e8a23be63274687e4fa22a557d864b1161dd1e75f765bddd2b96aa2e82423ccde3b5eecc909ffd004339a46f152e8c44fd1fdbe71fcf2d617992854da
-
SSDEEP
12288:CKBz1FxKfGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG2:JBz1Fx
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2744 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2116 sc.exe 2596 sc.exe 2712 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2896 2652 2368aa18bcdbe7be7eb90add30b17d35.exe 21 PID 2652 wrote to memory of 2896 2652 2368aa18bcdbe7be7eb90add30b17d35.exe 21 PID 2652 wrote to memory of 2896 2652 2368aa18bcdbe7be7eb90add30b17d35.exe 21 PID 2652 wrote to memory of 2896 2652 2368aa18bcdbe7be7eb90add30b17d35.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ugulbdut\2⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\neahyxbf.exe" C:\Windows\SysWOW64\ugulbdut\2⤵PID:3036
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ugulbdut binPath= "C:\Windows\SysWOW64\ugulbdut\neahyxbf.exe /d\"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ugulbdut "wifi internet conection"2⤵
- Launches sc.exe
PID:2596
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ugulbdut2⤵
- Launches sc.exe
PID:2712
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2744
-
-
C:\Windows\SysWOW64\ugulbdut\neahyxbf.exeC:\Windows\SysWOW64\ugulbdut\neahyxbf.exe /d"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"1⤵PID:2620
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2600
-