Analysis
-
max time kernel
184s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
05a2ffa77432d48e8dffb43a9e201c28.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05a2ffa77432d48e8dffb43a9e201c28.exe
Resource
win10v2004-20231215-en
General
-
Target
05a2ffa77432d48e8dffb43a9e201c28.exe
-
Size
10.0MB
-
MD5
05a2ffa77432d48e8dffb43a9e201c28
-
SHA1
63cf6faadb2815d4eaaa6fa82f8e561d92dfa487
-
SHA256
9c04dffcd40004b5474f4827f6eac7537f8a049eee351a6866206943c55e7513
-
SHA512
c15e73e89f936f0d28b0ed32a0a09cab11f6957d566da281cd903f80db94200e713ea09373bb1204d20396e1679a1ea6adf7a238d9ad925806ee01f0a70706d4
-
SSDEEP
49152:UQsPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:UQ
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4444 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\akidlrup\ImagePath = "C:\\Windows\\SysWOW64\\akidlrup\\ehppnlpy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 05a2ffa77432d48e8dffb43a9e201c28.exe -
Deletes itself 1 IoCs
pid Process 1248 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4020 ehppnlpy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4020 set thread context of 1248 4020 ehppnlpy.exe 107 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 912 sc.exe 4456 sc.exe 4608 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2556 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 93 PID 4980 wrote to memory of 2556 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 93 PID 4980 wrote to memory of 2556 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 93 PID 4980 wrote to memory of 380 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 96 PID 4980 wrote to memory of 380 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 96 PID 4980 wrote to memory of 380 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 96 PID 4980 wrote to memory of 912 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 99 PID 4980 wrote to memory of 912 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 99 PID 4980 wrote to memory of 912 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 99 PID 4980 wrote to memory of 4456 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 100 PID 4980 wrote to memory of 4456 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 100 PID 4980 wrote to memory of 4456 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 100 PID 4980 wrote to memory of 4608 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 103 PID 4980 wrote to memory of 4608 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 103 PID 4980 wrote to memory of 4608 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 103 PID 4980 wrote to memory of 4444 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 105 PID 4980 wrote to memory of 4444 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 105 PID 4980 wrote to memory of 4444 4980 05a2ffa77432d48e8dffb43a9e201c28.exe 105 PID 4020 wrote to memory of 1248 4020 ehppnlpy.exe 107 PID 4020 wrote to memory of 1248 4020 ehppnlpy.exe 107 PID 4020 wrote to memory of 1248 4020 ehppnlpy.exe 107 PID 4020 wrote to memory of 1248 4020 ehppnlpy.exe 107 PID 4020 wrote to memory of 1248 4020 ehppnlpy.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe"C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\akidlrup\2⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ehppnlpy.exe" C:\Windows\SysWOW64\akidlrup\2⤵PID:380
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create akidlrup binPath= "C:\Windows\SysWOW64\akidlrup\ehppnlpy.exe /d\"C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:912
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description akidlrup "wifi internet conection"2⤵
- Launches sc.exe
PID:4456
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start akidlrup2⤵
- Launches sc.exe
PID:4608
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4444
-
-
C:\Windows\SysWOW64\akidlrup\ehppnlpy.exeC:\Windows\SysWOW64\akidlrup\ehppnlpy.exe /d"C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
806KB
MD551f5f71e34f7beb35249357f45757739
SHA13558ec63395bd5c5a99aec9e97f810f8996dd7ff
SHA2560075a33191f9e64b371e380b6268727919874194dd8fb53cf692d3f5cf46c3d0
SHA512ce96f37551ad276e00820bdad72d1007b913baea56bbbdee25f1f431f2c1c9e1265d7dd7657e4355107eca145ea42420e7dfaa218ca659f8070fc0c1cd76fe13
-
Filesize
186KB
MD5b0944cb0e9fa53e55b5a8544a47de770
SHA1353befa735f196ac3f870a7c43f363cdf86af55c
SHA25618bd23a2021b6675ab4f97173b9884f8b49f12d754ddbfc556a6feaf9928f94b
SHA512b6f2db38e3b45b9a2cfb5cd5292fcc50e41146436e5dfa994568cd17f5f84b8d440c69f286774c6bfee95ad967ac3096bdf166b7cdac197df9ccefc444df08ce