Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 00:37
Static task
static1
Behavioral task
behavioral1
Sample
46ef9327547c02f18b3aacd05b5cf2c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46ef9327547c02f18b3aacd05b5cf2c1.exe
Resource
win10v2004-20231215-en
General
-
Target
46ef9327547c02f18b3aacd05b5cf2c1.exe
-
Size
12.3MB
-
MD5
46ef9327547c02f18b3aacd05b5cf2c1
-
SHA1
826d12c54a75c5c8166e8ead2407e372ca3992ca
-
SHA256
edb58c2175190df64d2d3bd6ddd3b59970dc443da2819dfee0805af801100a0f
-
SHA512
4a5f08d223cbd12e741360bf0bebbf685d9276592dc8baa9be81da8bf932bf2fa23f9fbb15128797abfb765648a01bc837c9e2e6f750254a630657d393473210
-
SSDEEP
6144:xvk9RADRUv1CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCa:aRAD
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\cvpsmkha = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2600 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\cvpsmkha\ImagePath = "C:\\Windows\\SysWOW64\\cvpsmkha\\mojarlsl.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2848 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 mojarlsl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2828 set thread context of 2848 2828 mojarlsl.exe 40 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2880 sc.exe 2928 sc.exe 2716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2076 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 19 PID 2108 wrote to memory of 2076 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 19 PID 2108 wrote to memory of 2076 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 19 PID 2108 wrote to memory of 2076 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 19 PID 2108 wrote to memory of 2112 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 28 PID 2108 wrote to memory of 2112 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 28 PID 2108 wrote to memory of 2112 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 28 PID 2108 wrote to memory of 2112 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 28 PID 2108 wrote to memory of 2928 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 33 PID 2108 wrote to memory of 2928 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 33 PID 2108 wrote to memory of 2928 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 33 PID 2108 wrote to memory of 2928 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 33 PID 2108 wrote to memory of 2716 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 34 PID 2108 wrote to memory of 2716 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 34 PID 2108 wrote to memory of 2716 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 34 PID 2108 wrote to memory of 2716 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 34 PID 2108 wrote to memory of 2880 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 37 PID 2108 wrote to memory of 2880 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 37 PID 2108 wrote to memory of 2880 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 37 PID 2108 wrote to memory of 2880 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 37 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2828 wrote to memory of 2848 2828 mojarlsl.exe 40 PID 2108 wrote to memory of 2600 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 39 PID 2108 wrote to memory of 2600 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 39 PID 2108 wrote to memory of 2600 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 39 PID 2108 wrote to memory of 2600 2108 46ef9327547c02f18b3aacd05b5cf2c1.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cvpsmkha\2⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mojarlsl.exe" C:\Windows\SysWOW64\cvpsmkha\2⤵PID:2112
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cvpsmkha binPath= "C:\Windows\SysWOW64\cvpsmkha\mojarlsl.exe /d\"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cvpsmkha "wifi internet conection"2⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cvpsmkha2⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2600
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe1⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2848
-
C:\Windows\SysWOW64\cvpsmkha\mojarlsl.exeC:\Windows\SysWOW64\cvpsmkha\mojarlsl.exe /d"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD58d0a0c6af500d9b8c53fcd89aa730136
SHA1c26dfae08886f17155f12d46a9fe72bbfe964678
SHA2560a520cc99e11dc762e166419bc9f30de7d2f5e62a8d756542bdb4c4fddd5d626
SHA51204ccac027480d4ea9a2e8a4c33542998df5e6284c132cd3e93b2ae85866ddad473cd12ed26ec222fc9d14f54ec1ab0c5c419e8ca720301dcdafccb9ad0996824
-
Filesize
92KB
MD5f3679d5cd2fcbc704eef2fddad613937
SHA1d28b5a65fff8d76316707866753a3c5172d09bb0
SHA2567cf006808fce041d7decbc50075e0c7f14b050e67ecfd5ebf16b426ad96fc3fb
SHA5121199846b592ba780c6183ee375074e9ac8ef3b14e23ec0014bce5653de9a6e55114a402f09bd02ba883ffff9686fc5290d6a4ea2b6dacfcbdb3fc6abbb77b495