Analysis
-
max time kernel
176s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:10
Static task
static1
Behavioral task
behavioral1
Sample
1986f6ee9a935c96a465c400744c572e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1986f6ee9a935c96a465c400744c572e.exe
Resource
win10v2004-20231215-en
General
-
Target
1986f6ee9a935c96a465c400744c572e.exe
-
Size
13.2MB
-
MD5
1986f6ee9a935c96a465c400744c572e
-
SHA1
b5864a9dd6ce06c058b3d250887d17b4c3a8e379
-
SHA256
7628868df077a2dd4e9f8453321e02a0929d4ef979d9774532a40d1abd2253e4
-
SHA512
3d396c9ad0886878e560f0742476344af2d367444f4a58b5881772091bcf2b01a793b197a6ed588c8d7dfba84479fd83441d495b37109b3f93ac1ccc3afeb1c4
-
SSDEEP
24576:1jY+lg48SlJPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPv:wHSl
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2776 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kvovetkc\ImagePath = "C:\\Windows\\SysWOW64\\kvovetkc\\eojevvou.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1986f6ee9a935c96a465c400744c572e.exe -
Deletes itself 1 IoCs
pid Process 4464 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 eojevvou.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 4464 1992 eojevvou.exe 110 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 552 sc.exe 4044 sc.exe 1848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3256 2924 WerFault.exe 89 4556 1992 WerFault.exe 108 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3608 2924 1986f6ee9a935c96a465c400744c572e.exe 95 PID 2924 wrote to memory of 3608 2924 1986f6ee9a935c96a465c400744c572e.exe 95 PID 2924 wrote to memory of 3608 2924 1986f6ee9a935c96a465c400744c572e.exe 95 PID 2924 wrote to memory of 2456 2924 1986f6ee9a935c96a465c400744c572e.exe 97 PID 2924 wrote to memory of 2456 2924 1986f6ee9a935c96a465c400744c572e.exe 97 PID 2924 wrote to memory of 2456 2924 1986f6ee9a935c96a465c400744c572e.exe 97 PID 2924 wrote to memory of 4044 2924 1986f6ee9a935c96a465c400744c572e.exe 99 PID 2924 wrote to memory of 4044 2924 1986f6ee9a935c96a465c400744c572e.exe 99 PID 2924 wrote to memory of 4044 2924 1986f6ee9a935c96a465c400744c572e.exe 99 PID 2924 wrote to memory of 1848 2924 1986f6ee9a935c96a465c400744c572e.exe 101 PID 2924 wrote to memory of 1848 2924 1986f6ee9a935c96a465c400744c572e.exe 101 PID 2924 wrote to memory of 1848 2924 1986f6ee9a935c96a465c400744c572e.exe 101 PID 2924 wrote to memory of 552 2924 1986f6ee9a935c96a465c400744c572e.exe 103 PID 2924 wrote to memory of 552 2924 1986f6ee9a935c96a465c400744c572e.exe 103 PID 2924 wrote to memory of 552 2924 1986f6ee9a935c96a465c400744c572e.exe 103 PID 2924 wrote to memory of 2776 2924 1986f6ee9a935c96a465c400744c572e.exe 105 PID 2924 wrote to memory of 2776 2924 1986f6ee9a935c96a465c400744c572e.exe 105 PID 2924 wrote to memory of 2776 2924 1986f6ee9a935c96a465c400744c572e.exe 105 PID 1992 wrote to memory of 4464 1992 eojevvou.exe 110 PID 1992 wrote to memory of 4464 1992 eojevvou.exe 110 PID 1992 wrote to memory of 4464 1992 eojevvou.exe 110 PID 1992 wrote to memory of 4464 1992 eojevvou.exe 110 PID 1992 wrote to memory of 4464 1992 eojevvou.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\1986f6ee9a935c96a465c400744c572e.exe"C:\Users\Admin\AppData\Local\Temp\1986f6ee9a935c96a465c400744c572e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kvovetkc\2⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\eojevvou.exe" C:\Windows\SysWOW64\kvovetkc\2⤵PID:2456
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kvovetkc binPath= "C:\Windows\SysWOW64\kvovetkc\eojevvou.exe /d\"C:\Users\Admin\AppData\Local\Temp\1986f6ee9a935c96a465c400744c572e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4044
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kvovetkc "wifi internet conection"2⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kvovetkc2⤵
- Launches sc.exe
PID:552
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 10362⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2924 -ip 29241⤵PID:4496
-
C:\Windows\SysWOW64\kvovetkc\eojevvou.exeC:\Windows\SysWOW64\kvovetkc\eojevvou.exe /d"C:\Users\Admin\AppData\Local\Temp\1986f6ee9a935c96a465c400744c572e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 5162⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1992 -ip 19921⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD5c89c5ced47be07a6d1a10d2bb86ff2bf
SHA199522edeae0cbd0cd5e4f678deab71aa51f4177d
SHA256a6723cb83a9db823c599c1781c79bb64630f540b494f638d53436da43e7ff65c
SHA512e9013527e8a2dc2e4ba881524f1bac760e330f2dcb8a7189de308ff663a29907a4ecb41fe8175b88b1ab15c5bd6c42722f421c21342212f39e9206ed6d20e5e7