Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
46ef9327547c02f18b3aacd05b5cf2c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46ef9327547c02f18b3aacd05b5cf2c1.exe
Resource
win10v2004-20231215-en
General
-
Target
46ef9327547c02f18b3aacd05b5cf2c1.exe
-
Size
12.3MB
-
MD5
46ef9327547c02f18b3aacd05b5cf2c1
-
SHA1
826d12c54a75c5c8166e8ead2407e372ca3992ca
-
SHA256
edb58c2175190df64d2d3bd6ddd3b59970dc443da2819dfee0805af801100a0f
-
SHA512
4a5f08d223cbd12e741360bf0bebbf685d9276592dc8baa9be81da8bf932bf2fa23f9fbb15128797abfb765648a01bc837c9e2e6f750254a630657d393473210
-
SSDEEP
6144:xvk9RADRUv1CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCa:aRAD
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3276 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wcnhymhs\ImagePath = "C:\\Windows\\SysWOW64\\wcnhymhs\\mkrnmvtk.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 46ef9327547c02f18b3aacd05b5cf2c1.exe -
Deletes itself 1 IoCs
pid Process 1288 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 mkrnmvtk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4052 set thread context of 1288 4052 mkrnmvtk.exe 104 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2908 sc.exe 3652 sc.exe 2856 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3644 wrote to memory of 2160 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 116 PID 3644 wrote to memory of 2160 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 116 PID 3644 wrote to memory of 2160 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 116 PID 3644 wrote to memory of 4844 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 96 PID 3644 wrote to memory of 4844 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 96 PID 3644 wrote to memory of 4844 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 96 PID 3644 wrote to memory of 3652 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 98 PID 3644 wrote to memory of 3652 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 98 PID 3644 wrote to memory of 3652 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 98 PID 3644 wrote to memory of 2856 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 100 PID 3644 wrote to memory of 2856 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 100 PID 3644 wrote to memory of 2856 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 100 PID 3644 wrote to memory of 2908 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 102 PID 3644 wrote to memory of 2908 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 102 PID 3644 wrote to memory of 2908 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 102 PID 4052 wrote to memory of 1288 4052 mkrnmvtk.exe 104 PID 4052 wrote to memory of 1288 4052 mkrnmvtk.exe 104 PID 4052 wrote to memory of 1288 4052 mkrnmvtk.exe 104 PID 4052 wrote to memory of 1288 4052 mkrnmvtk.exe 104 PID 4052 wrote to memory of 1288 4052 mkrnmvtk.exe 104 PID 3644 wrote to memory of 3276 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 106 PID 3644 wrote to memory of 3276 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 106 PID 3644 wrote to memory of 3276 3644 46ef9327547c02f18b3aacd05b5cf2c1.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wcnhymhs\2⤵PID:2160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mkrnmvtk.exe" C:\Windows\SysWOW64\wcnhymhs\2⤵PID:4844
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wcnhymhs binPath= "C:\Windows\SysWOW64\wcnhymhs\mkrnmvtk.exe /d\"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3652
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wcnhymhs "wifi internet conection"2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wcnhymhs2⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3276
-
-
C:\Windows\SysWOW64\wcnhymhs\mkrnmvtk.exeC:\Windows\SysWOW64\wcnhymhs\mkrnmvtk.exe /d"C:\Users\Admin\AppData\Local\Temp\46ef9327547c02f18b3aacd05b5cf2c1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1288
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv Sb8klhyLaEuR3dEo33BATQ.0.21⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD559108c99bfc64a07654da61af6f18fc2
SHA11ba1b92c982afe80a0de05df63b30c3881a8b540
SHA256f91fccb6638b6dc06d3cf7e9c38b1822074b18d41e07db32f58ca945bb696dc3
SHA512461c9243e4cc453d23c8c372561d002e47569a0a53d00423c6a7d3a981f77f599c1158d47b364ede95be883de2505959e6253787ab4caf579f440401ed7f1cbf
-
Filesize
349KB
MD509d2095fd0d3a58315164ae0a2912a25
SHA16afeeab65d3326fcad8df067abafb38ecafb0770
SHA2562ba773db41b46fb153ce9236590bdb31a3be2f1d9dc5f080df526b44b484bb3c
SHA512f7b007842e8b3d9153b4815e1cb55e0f0cedde2c552f01cc3950d90f31b31e072e7fd43c0c5a2351c7f7c124e74bfa7c3ae1c23a9c9419922810c4a41adcd080