Analysis
-
max time kernel
145s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
10955b59a370e9f78636a2b3bdda218d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10955b59a370e9f78636a2b3bdda218d.exe
Resource
win10v2004-20231215-en
General
-
Target
10955b59a370e9f78636a2b3bdda218d.exe
-
Size
13.1MB
-
MD5
10955b59a370e9f78636a2b3bdda218d
-
SHA1
cc4685968302c783df3e1db04c1552af627df611
-
SHA256
337fe1ac0900e6a6161126f01830debc25cd8f5affaec0f7aecd637baccc8fce
-
SHA512
62e40e88fa790bc7e9b5297aa4cc98f3b07115905f7e82e1007cab0bb7cd2c1f0b22b058d264a520946080fec05951a2b43f9b50b0cd0e319ccde116c8f930f1
-
SSDEEP
98304:ANWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllT:2W
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2160 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tdodveim\ImagePath = "C:\\Windows\\SysWOW64\\tdodveim\\nnozuvtb.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 10955b59a370e9f78636a2b3bdda218d.exe -
Deletes itself 1 IoCs
pid Process 1560 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 nnozuvtb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4892 set thread context of 1560 4892 nnozuvtb.exe 109 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2220 sc.exe 2388 sc.exe 952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1476 3012 10955b59a370e9f78636a2b3bdda218d.exe 96 PID 3012 wrote to memory of 1476 3012 10955b59a370e9f78636a2b3bdda218d.exe 96 PID 3012 wrote to memory of 1476 3012 10955b59a370e9f78636a2b3bdda218d.exe 96 PID 3012 wrote to memory of 4432 3012 10955b59a370e9f78636a2b3bdda218d.exe 98 PID 3012 wrote to memory of 4432 3012 10955b59a370e9f78636a2b3bdda218d.exe 98 PID 3012 wrote to memory of 4432 3012 10955b59a370e9f78636a2b3bdda218d.exe 98 PID 3012 wrote to memory of 952 3012 10955b59a370e9f78636a2b3bdda218d.exe 100 PID 3012 wrote to memory of 952 3012 10955b59a370e9f78636a2b3bdda218d.exe 100 PID 3012 wrote to memory of 952 3012 10955b59a370e9f78636a2b3bdda218d.exe 100 PID 3012 wrote to memory of 2220 3012 10955b59a370e9f78636a2b3bdda218d.exe 102 PID 3012 wrote to memory of 2220 3012 10955b59a370e9f78636a2b3bdda218d.exe 102 PID 3012 wrote to memory of 2220 3012 10955b59a370e9f78636a2b3bdda218d.exe 102 PID 3012 wrote to memory of 2388 3012 10955b59a370e9f78636a2b3bdda218d.exe 104 PID 3012 wrote to memory of 2388 3012 10955b59a370e9f78636a2b3bdda218d.exe 104 PID 3012 wrote to memory of 2388 3012 10955b59a370e9f78636a2b3bdda218d.exe 104 PID 3012 wrote to memory of 2160 3012 10955b59a370e9f78636a2b3bdda218d.exe 106 PID 3012 wrote to memory of 2160 3012 10955b59a370e9f78636a2b3bdda218d.exe 106 PID 3012 wrote to memory of 2160 3012 10955b59a370e9f78636a2b3bdda218d.exe 106 PID 4892 wrote to memory of 1560 4892 nnozuvtb.exe 109 PID 4892 wrote to memory of 1560 4892 nnozuvtb.exe 109 PID 4892 wrote to memory of 1560 4892 nnozuvtb.exe 109 PID 4892 wrote to memory of 1560 4892 nnozuvtb.exe 109 PID 4892 wrote to memory of 1560 4892 nnozuvtb.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\10955b59a370e9f78636a2b3bdda218d.exe"C:\Users\Admin\AppData\Local\Temp\10955b59a370e9f78636a2b3bdda218d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tdodveim\2⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nnozuvtb.exe" C:\Windows\SysWOW64\tdodveim\2⤵PID:4432
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tdodveim binPath= "C:\Windows\SysWOW64\tdodveim\nnozuvtb.exe /d\"C:\Users\Admin\AppData\Local\Temp\10955b59a370e9f78636a2b3bdda218d.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tdodveim "wifi internet conection"2⤵
- Launches sc.exe
PID:2220
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tdodveim2⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2160
-
-
C:\Windows\SysWOW64\tdodveim\nnozuvtb.exeC:\Windows\SysWOW64\tdodveim\nnozuvtb.exe /d"C:\Users\Admin\AppData\Local\Temp\10955b59a370e9f78636a2b3bdda218d.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5fd785ec6964b258e097cd5e2b44530eb
SHA107c0512dd41ca7f5c4392b2392d2b25f48b600f3
SHA256c861f2ac04c69945a88198837a2a67f90dd401ea4b3bbac207460a44aaf18fd5
SHA512ff16f6258ffb15df922ceb320b7a97ed8bb11ed747ea3fd1672c3f9e502f09b751cbb7296a2b319d29438966b830c949df2cd0b32c38bcd4500c85a4968caee4
-
Filesize
2.7MB
MD5058dda15c1b6cebdfbe04404e7621cb8
SHA1fe28dcc7c022559aa0bb12467e787ec665a7c8f7
SHA2569ea4a34f1715d690ae0fd27f251dd5533f7933245890eb67c7b2298283598da5
SHA5123f1a137f08c4958738ddc1ab157594091fd49cefe97280ccadf708163410d001b58ef6aa75bb0d0b5df8e7fb68e367093e10c0f384c871cab4aac957a0230cf4