Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
3c7b639b7991255518ac3ff7a9cd7926.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c7b639b7991255518ac3ff7a9cd7926.exe
Resource
win10v2004-20231215-en
General
-
Target
3c7b639b7991255518ac3ff7a9cd7926.exe
-
Size
13.0MB
-
MD5
3c7b639b7991255518ac3ff7a9cd7926
-
SHA1
78df0e627aef3c579512f8a2f80868144d363c0a
-
SHA256
ede12aae367dc234d5043dfb40537182d2fd9874c7165b8c9edca4a210ad14c2
-
SHA512
20f98dd5c76b3a2f2cc7892ac0f9ccc056edd971b818cea297a4be64d645265df116c269ac60f60e5b8e034b5617ce59493895ba223a3bb823b130121c74a33e
-
SSDEEP
196608:rzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzb:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\hsotpypz = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 868 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\hsotpypz\ImagePath = "C:\\Windows\\SysWOW64\\hsotpypz\\vzkcgnou.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2472 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 vzkcgnou.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2472 2640 vzkcgnou.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2272 sc.exe 2880 sc.exe 2480 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2928 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 29 PID 2204 wrote to memory of 2928 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 29 PID 2204 wrote to memory of 2928 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 29 PID 2204 wrote to memory of 2928 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 29 PID 2204 wrote to memory of 964 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 31 PID 2204 wrote to memory of 964 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 31 PID 2204 wrote to memory of 964 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 31 PID 2204 wrote to memory of 964 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 31 PID 2204 wrote to memory of 2272 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 33 PID 2204 wrote to memory of 2272 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 33 PID 2204 wrote to memory of 2272 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 33 PID 2204 wrote to memory of 2272 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 33 PID 2204 wrote to memory of 2880 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 35 PID 2204 wrote to memory of 2880 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 35 PID 2204 wrote to memory of 2880 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 35 PID 2204 wrote to memory of 2880 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 35 PID 2204 wrote to memory of 2480 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 37 PID 2204 wrote to memory of 2480 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 37 PID 2204 wrote to memory of 2480 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 37 PID 2204 wrote to memory of 2480 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 37 PID 2204 wrote to memory of 868 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 40 PID 2204 wrote to memory of 868 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 40 PID 2204 wrote to memory of 868 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 40 PID 2204 wrote to memory of 868 2204 3c7b639b7991255518ac3ff7a9cd7926.exe 40 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41 PID 2640 wrote to memory of 2472 2640 vzkcgnou.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7b639b7991255518ac3ff7a9cd7926.exe"C:\Users\Admin\AppData\Local\Temp\3c7b639b7991255518ac3ff7a9cd7926.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hsotpypz\2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vzkcgnou.exe" C:\Windows\SysWOW64\hsotpypz\2⤵PID:964
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hsotpypz binPath= "C:\Windows\SysWOW64\hsotpypz\vzkcgnou.exe /d\"C:\Users\Admin\AppData\Local\Temp\3c7b639b7991255518ac3ff7a9cd7926.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hsotpypz "wifi internet conection"2⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hsotpypz2⤵
- Launches sc.exe
PID:2480
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:868
-
-
C:\Windows\SysWOW64\hsotpypz\vzkcgnou.exeC:\Windows\SysWOW64\hsotpypz\vzkcgnou.exe /d"C:\Users\Admin\AppData\Local\Temp\3c7b639b7991255518ac3ff7a9cd7926.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2