Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:34
Static task
static1
Behavioral task
behavioral1
Sample
22fb4c623834ad8a3f602da708000647.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22fb4c623834ad8a3f602da708000647.exe
Resource
win10v2004-20231215-en
General
-
Target
22fb4c623834ad8a3f602da708000647.exe
-
Size
10.0MB
-
MD5
22fb4c623834ad8a3f602da708000647
-
SHA1
7386485a6086bf06ee7df34f6aa9c19a564749cf
-
SHA256
508c827bc2401fa6a6b3ab11c6c151709b719df4f148edebee8aa1483d367f42
-
SHA512
454f20708a71da5c851016c27600f55eb26192199cb312957dc33848fb13a5ec02ce67f9bfc2064785a800e2e0715e7cfa9cab262fd0142c6a0661bd2893b444
-
SSDEEP
98304:I2UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU0:I
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\yysixuew = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2644 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\yysixuew\ImagePath = "C:\\Windows\\SysWOW64\\yysixuew\\edtpwsx.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2636 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 edtpwsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 2636 2680 edtpwsx.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1932 sc.exe 2332 sc.exe 1396 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2808 2664 22fb4c623834ad8a3f602da708000647.exe 28 PID 2664 wrote to memory of 2808 2664 22fb4c623834ad8a3f602da708000647.exe 28 PID 2664 wrote to memory of 2808 2664 22fb4c623834ad8a3f602da708000647.exe 28 PID 2664 wrote to memory of 2808 2664 22fb4c623834ad8a3f602da708000647.exe 28 PID 2664 wrote to memory of 2788 2664 22fb4c623834ad8a3f602da708000647.exe 31 PID 2664 wrote to memory of 2788 2664 22fb4c623834ad8a3f602da708000647.exe 31 PID 2664 wrote to memory of 2788 2664 22fb4c623834ad8a3f602da708000647.exe 31 PID 2664 wrote to memory of 2788 2664 22fb4c623834ad8a3f602da708000647.exe 31 PID 2664 wrote to memory of 1932 2664 22fb4c623834ad8a3f602da708000647.exe 32 PID 2664 wrote to memory of 1932 2664 22fb4c623834ad8a3f602da708000647.exe 32 PID 2664 wrote to memory of 1932 2664 22fb4c623834ad8a3f602da708000647.exe 32 PID 2664 wrote to memory of 1932 2664 22fb4c623834ad8a3f602da708000647.exe 32 PID 2664 wrote to memory of 2332 2664 22fb4c623834ad8a3f602da708000647.exe 34 PID 2664 wrote to memory of 2332 2664 22fb4c623834ad8a3f602da708000647.exe 34 PID 2664 wrote to memory of 2332 2664 22fb4c623834ad8a3f602da708000647.exe 34 PID 2664 wrote to memory of 2332 2664 22fb4c623834ad8a3f602da708000647.exe 34 PID 2664 wrote to memory of 1396 2664 22fb4c623834ad8a3f602da708000647.exe 36 PID 2664 wrote to memory of 1396 2664 22fb4c623834ad8a3f602da708000647.exe 36 PID 2664 wrote to memory of 1396 2664 22fb4c623834ad8a3f602da708000647.exe 36 PID 2664 wrote to memory of 1396 2664 22fb4c623834ad8a3f602da708000647.exe 36 PID 2664 wrote to memory of 2644 2664 22fb4c623834ad8a3f602da708000647.exe 40 PID 2664 wrote to memory of 2644 2664 22fb4c623834ad8a3f602da708000647.exe 40 PID 2664 wrote to memory of 2644 2664 22fb4c623834ad8a3f602da708000647.exe 40 PID 2664 wrote to memory of 2644 2664 22fb4c623834ad8a3f602da708000647.exe 40 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41 PID 2680 wrote to memory of 2636 2680 edtpwsx.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yysixuew\2⤵PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\edtpwsx.exe" C:\Windows\SysWOW64\yysixuew\2⤵PID:2788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create yysixuew binPath= "C:\Windows\SysWOW64\yysixuew\edtpwsx.exe /d\"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1932
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description yysixuew "wifi internet conection"2⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start yysixuew2⤵
- Launches sc.exe
PID:1396
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2644
-
-
C:\Windows\SysWOW64\yysixuew\edtpwsx.exeC:\Windows\SysWOW64\yysixuew\edtpwsx.exe /d"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5e41afc6800f113729a94562c4d0f6076
SHA1352c8380ea21350143f95d7cf6a354fab143847e
SHA256967ce8c6549f50edeb7d6dd9f0b94735f7f5f3d788a74851fb708da26e4b27be
SHA51274d21aca4a3a0f4d746841067105957961e0770659ba0aba07f5a9e7d34df2b89219ca1d1457be4e572e31d0b1f19cf5360619bbc69b0c70d3e2e297e8ca5ee3
-
Filesize
139KB
MD58d4dc0dec2a9878db5c502a868e7c847
SHA17fdc293f889b46449766b53f4c40d550cb4e2bf6
SHA25633626cbbb64ced7b2c8229bcd0905980008f8744f15e20e3ed084bc14b66c90d
SHA5121366617bbb3efdc332cc2636f73854376c3ca24ccd9c04fd5b5cae8575015f4a1b9480069270151633d358383874898025c4b8bb57f72441a6c42109079f928c