Analysis

  • max time kernel
    3s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 04:51

General

  • Target

    0f17b0d4320240b6109bc8a25f505e09.exe

  • Size

    13.0MB

  • MD5

    0f17b0d4320240b6109bc8a25f505e09

  • SHA1

    995e221404656216ce3ff4cd17f82b4b5bdd8c2c

  • SHA256

    d0eff54fcc3e55633eaf0b74e3e757cd17ac81abe8015cca3496b3f10f9a45d5

  • SHA512

    eeca32f1953961d360233613e10818c5398b36e57e888175099b005af646f00a3a82f8fb134690d1b1059ff5ec4fb5bd9ed21a692d68fbbc721b8ba35d74509a

  • SSDEEP

    24576:gT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRB:Qp+

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f17b0d4320240b6109bc8a25f505e09.exe
    "C:\Users\Admin\AppData\Local\Temp\0f17b0d4320240b6109bc8a25f505e09.exe"
    1⤵
      PID:2152
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\orxvirwi\
        2⤵
          PID:2212
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vbmxpeyk.exe" C:\Windows\SysWOW64\orxvirwi\
          2⤵
            PID:4716
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create orxvirwi binPath= "C:\Windows\SysWOW64\orxvirwi\vbmxpeyk.exe /d\"C:\Users\Admin\AppData\Local\Temp\0f17b0d4320240b6109bc8a25f505e09.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
            • Launches sc.exe
            PID:1820
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description orxvirwi "wifi internet conection"
            2⤵
            • Launches sc.exe
            PID:4292
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start orxvirwi
            2⤵
            • Launches sc.exe
            PID:4776
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            2⤵
            • Modifies Windows Firewall
            PID:2800
        • C:\Windows\SysWOW64\orxvirwi\vbmxpeyk.exe
          C:\Windows\SysWOW64\orxvirwi\vbmxpeyk.exe /d"C:\Users\Admin\AppData\Local\Temp\0f17b0d4320240b6109bc8a25f505e09.exe"
          1⤵
            PID:4788
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              2⤵
                PID:4792

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\vbmxpeyk.exe

              Filesize

              386KB

              MD5

              50792ad35b827262a5c379f8472823cd

              SHA1

              b4be50e430b7afa7ec019479bbc6bb0d854d37fc

              SHA256

              5d43d53a3e9233a89dbf9ee1bf48f560d1a3430a80ff764b9d98844a9dad54c0

              SHA512

              d6cd27174db723cb546c8b1970f976c087385822a78b1a377c8af32afc83a0b41c401b105bb929774bc7564184b5181590b14a8af3e94cc0366c2e090fd43e01

            • memory/2152-1-0x0000000000AB0000-0x0000000000BB0000-memory.dmp

              Filesize

              1024KB

            • memory/2152-4-0x0000000000400000-0x00000000008EE000-memory.dmp

              Filesize

              4.9MB

            • memory/2152-7-0x0000000000400000-0x00000000008EE000-memory.dmp

              Filesize

              4.9MB

            • memory/2152-8-0x0000000000A90000-0x0000000000AA3000-memory.dmp

              Filesize

              76KB

            • memory/2152-2-0x0000000000A90000-0x0000000000AA3000-memory.dmp

              Filesize

              76KB

            • memory/4788-14-0x0000000000400000-0x00000000008EE000-memory.dmp

              Filesize

              4.9MB

            • memory/4788-13-0x0000000000400000-0x00000000008EE000-memory.dmp

              Filesize

              4.9MB

            • memory/4788-10-0x00000000009B0000-0x0000000000AB0000-memory.dmp

              Filesize

              1024KB

            • memory/4792-11-0x0000000000F60000-0x0000000000F75000-memory.dmp

              Filesize

              84KB

            • memory/4792-18-0x0000000000F60000-0x0000000000F75000-memory.dmp

              Filesize

              84KB

            • memory/4792-17-0x0000000000F60000-0x0000000000F75000-memory.dmp

              Filesize

              84KB

            • memory/4792-19-0x0000000000F60000-0x0000000000F75000-memory.dmp

              Filesize

              84KB