Analysis
-
max time kernel
1s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:54
Static task
static1
Behavioral task
behavioral1
Sample
2368aa18bcdbe7be7eb90add30b17d35.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2368aa18bcdbe7be7eb90add30b17d35.exe
Resource
win10v2004-20231222-en
General
-
Target
2368aa18bcdbe7be7eb90add30b17d35.exe
-
Size
11.8MB
-
MD5
2368aa18bcdbe7be7eb90add30b17d35
-
SHA1
39952f16bba27c35d4c8825d7ce59e01afc8daae
-
SHA256
5081506feb46f06efc15eb14a7deff7618a7bfbe0a42363c6478540002647c7e
-
SHA512
9d29520e8a23be63274687e4fa22a557d864b1161dd1e75f765bddd2b96aa2e82423ccde3b5eecc909ffd004339a46f152e8c44fd1fdbe71fcf2d617992854da
-
SSDEEP
12288:CKBz1FxKfGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG2:JBz1Fx
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 512 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2368aa18bcdbe7be7eb90add30b17d35.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1548 sc.exe 620 sc.exe 3488 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1692 3528 WerFault.exe 104 3364 752 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 752 wrote to memory of 5088 752 2368aa18bcdbe7be7eb90add30b17d35.exe 94 PID 752 wrote to memory of 5088 752 2368aa18bcdbe7be7eb90add30b17d35.exe 94 PID 752 wrote to memory of 5088 752 2368aa18bcdbe7be7eb90add30b17d35.exe 94 PID 752 wrote to memory of 4792 752 2368aa18bcdbe7be7eb90add30b17d35.exe 97 PID 752 wrote to memory of 4792 752 2368aa18bcdbe7be7eb90add30b17d35.exe 97 PID 752 wrote to memory of 4792 752 2368aa18bcdbe7be7eb90add30b17d35.exe 97 PID 752 wrote to memory of 1548 752 2368aa18bcdbe7be7eb90add30b17d35.exe 99 PID 752 wrote to memory of 1548 752 2368aa18bcdbe7be7eb90add30b17d35.exe 99 PID 752 wrote to memory of 1548 752 2368aa18bcdbe7be7eb90add30b17d35.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hayoborz\2⤵PID:5088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zttkvevx.exe" C:\Windows\SysWOW64\hayoborz\2⤵PID:4792
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hayoborz binPath= "C:\Windows\SysWOW64\hayoborz\zttkvevx.exe /d\"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hayoborz "wifi internet conection"2⤵
- Launches sc.exe
PID:620
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hayoborz2⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 5802⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:512
-
-
C:\Windows\SysWOW64\hayoborz\zttkvevx.exeC:\Windows\SysWOW64\hayoborz\zttkvevx.exe /d"C:\Users\Admin\AppData\Local\Temp\2368aa18bcdbe7be7eb90add30b17d35.exe"1⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 1762⤵
- Program crash
PID:1692
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3528 -ip 35281⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 752 -ip 7521⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5a5e5c68bef15e3b65051d1d08c21dfff
SHA1cfb0eb06737aed4dff105b404c8124be39aa1021
SHA256edf776ba879a4820b43bdde3caec0551aa7cbb049819c2cace0480b7f9788a77
SHA512dd47bcbad59db7649c2c3ac144210b15ce8f9bfa6a35c9705660735ac68d548254bcfb5b2af6bea2e781b12586540549f316e91e21e6f8dec13e6a567cd65694
-
Filesize
252KB
MD5d9b78ef0231a9008542ec15d3dcdd7e3
SHA1f9954f709be83344679ebe697c2c8dfc6bc09676
SHA2567baa8c599ae8ab87c6ff58cf74c01834473c2e67d1b4592ffdef3ed6d86202dc
SHA5128af2332235a878b5cd94e48b936c64b27cffd5e609b0f2a325d0e9890172927e56717ca0c4719ac3f0be52abd5799809c39eab07f62df7aa50f87a11702e0586