Analysis
-
max time kernel
164s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
2087dcbdd917f0c96f2e4067b4e63d49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2087dcbdd917f0c96f2e4067b4e63d49.exe
Resource
win10v2004-20231215-en
General
-
Target
2087dcbdd917f0c96f2e4067b4e63d49.exe
-
Size
13.1MB
-
MD5
2087dcbdd917f0c96f2e4067b4e63d49
-
SHA1
1b39f885512cf99e1f10a51308631a96f982f970
-
SHA256
7dcf006ee2cc77b93ea32f21abf7cdf57032186f9a5bc5d9d7654179ff6e0170
-
SHA512
6feba0192685c4c959b0d87c1501c4e7231a7a5bc20fda842fea9248c9a69e530b039cb7da5bed20cae25bd6dadf75a5df46bbf87da6273c72c52eb2f83fb29b
-
SSDEEP
196608:PXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXH:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2020 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2087dcbdd917f0c96f2e4067b4e63d49.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1064 sc.exe 928 sc.exe 1352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4672 1460 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3408 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 98 PID 1460 wrote to memory of 3408 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 98 PID 1460 wrote to memory of 3408 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 98 PID 1460 wrote to memory of 1448 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 101 PID 1460 wrote to memory of 1448 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 101 PID 1460 wrote to memory of 1448 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 101 PID 1460 wrote to memory of 1064 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 103 PID 1460 wrote to memory of 1064 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 103 PID 1460 wrote to memory of 1064 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 103 PID 1460 wrote to memory of 928 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 105 PID 1460 wrote to memory of 928 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 105 PID 1460 wrote to memory of 928 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 105 PID 1460 wrote to memory of 1352 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 108 PID 1460 wrote to memory of 1352 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 108 PID 1460 wrote to memory of 1352 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 108 PID 1460 wrote to memory of 2020 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 109 PID 1460 wrote to memory of 2020 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 109 PID 1460 wrote to memory of 2020 1460 2087dcbdd917f0c96f2e4067b4e63d49.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2087dcbdd917f0c96f2e4067b4e63d49.exe"C:\Users\Admin\AppData\Local\Temp\2087dcbdd917f0c96f2e4067b4e63d49.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ftglhbpd\2⤵PID:3408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gghpvqse.exe" C:\Windows\SysWOW64\ftglhbpd\2⤵PID:1448
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ftglhbpd binPath= "C:\Windows\SysWOW64\ftglhbpd\gghpvqse.exe /d\"C:\Users\Admin\AppData\Local\Temp\2087dcbdd917f0c96f2e4067b4e63d49.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1064
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ftglhbpd "wifi internet conection"2⤵
- Launches sc.exe
PID:928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ftglhbpd2⤵
- Launches sc.exe
PID:1352
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 6002⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1460 -ip 14601⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738KB
MD53973c38c330329dede5506fa0c5cc917
SHA1430343af8f7081c97e508913ea07c2d8e2704448
SHA256950607d198cfeb40b219c42283551536f295062183ad58a49b328214f8c0ad5f
SHA51270d8802a1e8c87cc02e7f662306d4cb876d187f3602b93e3f6cf6d2addd81f6057e1f7837b607c44a59e00ce1f7574281a74466256ddf85fa7ed00190d31dbc5