Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
00c6c6c2279d82386f35e313b20e2f64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00c6c6c2279d82386f35e313b20e2f64.exe
Resource
win10v2004-20231215-en
General
-
Target
00c6c6c2279d82386f35e313b20e2f64.exe
-
Size
14.9MB
-
MD5
00c6c6c2279d82386f35e313b20e2f64
-
SHA1
3fb56c91e1f98a1947b0e46a6670eff8608e7607
-
SHA256
11f82a741fea978323326417b3632e106ad60c8f9005dc23d2daff6a4e51e8d6
-
SHA512
42b4726ff580b27108a19dae2e0c662666a611fc417a24e988a92cb20ea296d987e6410d6c7003a93d5e282cc78396d4caa43f41c8965f61bd2e86a6c5ccba06
-
SSDEEP
12288:gRXQK44fy611111111111111111111111111111111111111111111111111111l:gRx2
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2568 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kbizuled\ImagePath = "C:\\Windows\\SysWOW64\\kbizuled\\disnhtqs.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2192 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 disnhtqs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 2192 2188 disnhtqs.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2580 sc.exe 2688 sc.exe 2916 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2280 2372 00c6c6c2279d82386f35e313b20e2f64.exe 28 PID 2372 wrote to memory of 2280 2372 00c6c6c2279d82386f35e313b20e2f64.exe 28 PID 2372 wrote to memory of 2280 2372 00c6c6c2279d82386f35e313b20e2f64.exe 28 PID 2372 wrote to memory of 2280 2372 00c6c6c2279d82386f35e313b20e2f64.exe 28 PID 2372 wrote to memory of 2864 2372 00c6c6c2279d82386f35e313b20e2f64.exe 30 PID 2372 wrote to memory of 2864 2372 00c6c6c2279d82386f35e313b20e2f64.exe 30 PID 2372 wrote to memory of 2864 2372 00c6c6c2279d82386f35e313b20e2f64.exe 30 PID 2372 wrote to memory of 2864 2372 00c6c6c2279d82386f35e313b20e2f64.exe 30 PID 2372 wrote to memory of 2580 2372 00c6c6c2279d82386f35e313b20e2f64.exe 32 PID 2372 wrote to memory of 2580 2372 00c6c6c2279d82386f35e313b20e2f64.exe 32 PID 2372 wrote to memory of 2580 2372 00c6c6c2279d82386f35e313b20e2f64.exe 32 PID 2372 wrote to memory of 2580 2372 00c6c6c2279d82386f35e313b20e2f64.exe 32 PID 2372 wrote to memory of 2688 2372 00c6c6c2279d82386f35e313b20e2f64.exe 34 PID 2372 wrote to memory of 2688 2372 00c6c6c2279d82386f35e313b20e2f64.exe 34 PID 2372 wrote to memory of 2688 2372 00c6c6c2279d82386f35e313b20e2f64.exe 34 PID 2372 wrote to memory of 2688 2372 00c6c6c2279d82386f35e313b20e2f64.exe 34 PID 2372 wrote to memory of 2916 2372 00c6c6c2279d82386f35e313b20e2f64.exe 36 PID 2372 wrote to memory of 2916 2372 00c6c6c2279d82386f35e313b20e2f64.exe 36 PID 2372 wrote to memory of 2916 2372 00c6c6c2279d82386f35e313b20e2f64.exe 36 PID 2372 wrote to memory of 2916 2372 00c6c6c2279d82386f35e313b20e2f64.exe 36 PID 2372 wrote to memory of 2568 2372 00c6c6c2279d82386f35e313b20e2f64.exe 38 PID 2372 wrote to memory of 2568 2372 00c6c6c2279d82386f35e313b20e2f64.exe 38 PID 2372 wrote to memory of 2568 2372 00c6c6c2279d82386f35e313b20e2f64.exe 38 PID 2372 wrote to memory of 2568 2372 00c6c6c2279d82386f35e313b20e2f64.exe 38 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43 PID 2188 wrote to memory of 2192 2188 disnhtqs.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\00c6c6c2279d82386f35e313b20e2f64.exe"C:\Users\Admin\AppData\Local\Temp\00c6c6c2279d82386f35e313b20e2f64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kbizuled\2⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\disnhtqs.exe" C:\Windows\SysWOW64\kbizuled\2⤵PID:2864
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kbizuled binPath= "C:\Windows\SysWOW64\kbizuled\disnhtqs.exe /d\"C:\Users\Admin\AppData\Local\Temp\00c6c6c2279d82386f35e313b20e2f64.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kbizuled "wifi internet conection"2⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kbizuled2⤵
- Launches sc.exe
PID:2916
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2568
-
-
C:\Windows\SysWOW64\kbizuled\disnhtqs.exeC:\Windows\SysWOW64\kbizuled\disnhtqs.exe /d"C:\Users\Admin\AppData\Local\Temp\00c6c6c2279d82386f35e313b20e2f64.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5dff494aa49d9959421751a463bc892eb
SHA19c458126187a597ea0f2124cbc6b82b7414c4897
SHA2566d4874af562d7a2295fbb9c5b5ca40128fcff07612ce20361e570f2708f4aead
SHA512e8863e729da8db2a10fe2039bf4b600e44ca0b94578881bcb7f2225ef8a5a252de0a00f43abdfbb5493205aba07eb10c4ed979f2be735d23613ddf4dcb4613e7
-
Filesize
1.1MB
MD556b12808b156e34c638fb246312b5ec1
SHA1e2b11e0c8e81fae673b4997105cef2ec757acf73
SHA25655265254069535ac88f4f798159e9689be107d4f112d1c5d79259857d48fa45e
SHA512db546e14f5bc20e1d753afc8d868d92c3edb2a00ab6c3ed48e1a7d590aae01df7256d0cf5665ac4463c0e50b7df79298ba28c0ef5f46342f298bb51351271bb2