Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
08e2a9bf296ab0b6532f8404b35fa1ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08e2a9bf296ab0b6532f8404b35fa1ee.exe
Resource
win10v2004-20231215-en
General
-
Target
08e2a9bf296ab0b6532f8404b35fa1ee.exe
-
Size
10.3MB
-
MD5
08e2a9bf296ab0b6532f8404b35fa1ee
-
SHA1
813a762623d7a6ee5de265cccef53f95eb1c4842
-
SHA256
f4249609884135f73548ec366d2d6ebf0caef1450c5c2fd29d5f2810572571a5
-
SHA512
5cba8e6b8a4848306df21645955c3d55f26810aab2916f59e84178fad1df8817b204e0f25e90ff87c1caccc0d74c7ce0bf5790281ea5ddd468c685c181cf5e17
-
SSDEEP
49152:Gj55555555555555555555555555555555555555555555555555555555555559:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3652 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fzxapxjc\ImagePath = "C:\\Windows\\SysWOW64\\fzxapxjc\\ukqjksir.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 08e2a9bf296ab0b6532f8404b35fa1ee.exe -
Deletes itself 1 IoCs
pid Process 3096 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3256 ukqjksir.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3256 set thread context of 3096 3256 ukqjksir.exe 85 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2852 sc.exe 4160 sc.exe 4588 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 736 wrote to memory of 2608 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 31 PID 736 wrote to memory of 2608 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 31 PID 736 wrote to memory of 2608 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 31 PID 736 wrote to memory of 2200 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 41 PID 736 wrote to memory of 2200 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 41 PID 736 wrote to memory of 2200 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 41 PID 736 wrote to memory of 2852 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 52 PID 736 wrote to memory of 2852 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 52 PID 736 wrote to memory of 2852 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 52 PID 736 wrote to memory of 4160 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 62 PID 736 wrote to memory of 4160 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 62 PID 736 wrote to memory of 4160 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 62 PID 736 wrote to memory of 4588 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 74 PID 736 wrote to memory of 4588 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 74 PID 736 wrote to memory of 4588 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 74 PID 3256 wrote to memory of 3096 3256 ukqjksir.exe 85 PID 3256 wrote to memory of 3096 3256 ukqjksir.exe 85 PID 3256 wrote to memory of 3096 3256 ukqjksir.exe 85 PID 3256 wrote to memory of 3096 3256 ukqjksir.exe 85 PID 3256 wrote to memory of 3096 3256 ukqjksir.exe 85 PID 736 wrote to memory of 3652 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 84 PID 736 wrote to memory of 3652 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 84 PID 736 wrote to memory of 3652 736 08e2a9bf296ab0b6532f8404b35fa1ee.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e2a9bf296ab0b6532f8404b35fa1ee.exe"C:\Users\Admin\AppData\Local\Temp\08e2a9bf296ab0b6532f8404b35fa1ee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fzxapxjc\2⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ukqjksir.exe" C:\Windows\SysWOW64\fzxapxjc\2⤵PID:2200
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fzxapxjc binPath= "C:\Windows\SysWOW64\fzxapxjc\ukqjksir.exe /d\"C:\Users\Admin\AppData\Local\Temp\08e2a9bf296ab0b6532f8404b35fa1ee.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fzxapxjc "wifi internet conection"2⤵
- Launches sc.exe
PID:4160
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fzxapxjc2⤵
- Launches sc.exe
PID:4588
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3652
-
-
C:\Windows\SysWOW64\fzxapxjc\ukqjksir.exeC:\Windows\SysWOW64\fzxapxjc\ukqjksir.exe /d"C:\Users\Admin\AppData\Local\Temp\08e2a9bf296ab0b6532f8404b35fa1ee.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3096
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD502fd2f499cea7dcdfda1c9a1ba2d8742
SHA1b0e9fc1b5d135ba68a109082ee47a41abc1e5425
SHA256202a517634fbce128f21aa9b17e9c54dcf6dc816153a501bf5c37e13a5809552
SHA51228d64bbe6b7093d6fdf83b67898bb46d2130639511d5ad5ad709d24b52003ee213da6d910fef762a5b9d4090f84493a5f4ea3f01c88cd4382c99bde9f2c33f00