Analysis
-
max time kernel
171s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:34
Static task
static1
Behavioral task
behavioral1
Sample
22fb4c623834ad8a3f602da708000647.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22fb4c623834ad8a3f602da708000647.exe
Resource
win10v2004-20231215-en
General
-
Target
22fb4c623834ad8a3f602da708000647.exe
-
Size
10.0MB
-
MD5
22fb4c623834ad8a3f602da708000647
-
SHA1
7386485a6086bf06ee7df34f6aa9c19a564749cf
-
SHA256
508c827bc2401fa6a6b3ab11c6c151709b719df4f148edebee8aa1483d367f42
-
SHA512
454f20708a71da5c851016c27600f55eb26192199cb312957dc33848fb13a5ec02ce67f9bfc2064785a800e2e0715e7cfa9cab262fd0142c6a0661bd2893b444
-
SSDEEP
98304:I2UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU0:I
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4136 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cysxlxuq\ImagePath = "C:\\Windows\\SysWOW64\\cysxlxuq\\qlspolhi.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 22fb4c623834ad8a3f602da708000647.exe -
Deletes itself 1 IoCs
pid Process 3136 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1444 qlspolhi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1444 set thread context of 3136 1444 qlspolhi.exe 108 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1672 sc.exe 4432 sc.exe 4540 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4312 1444 WerFault.exe 104 5072 4780 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2008 4780 22fb4c623834ad8a3f602da708000647.exe 94 PID 4780 wrote to memory of 2008 4780 22fb4c623834ad8a3f602da708000647.exe 94 PID 4780 wrote to memory of 2008 4780 22fb4c623834ad8a3f602da708000647.exe 94 PID 4780 wrote to memory of 1904 4780 22fb4c623834ad8a3f602da708000647.exe 96 PID 4780 wrote to memory of 1904 4780 22fb4c623834ad8a3f602da708000647.exe 96 PID 4780 wrote to memory of 1904 4780 22fb4c623834ad8a3f602da708000647.exe 96 PID 4780 wrote to memory of 4432 4780 22fb4c623834ad8a3f602da708000647.exe 98 PID 4780 wrote to memory of 4432 4780 22fb4c623834ad8a3f602da708000647.exe 98 PID 4780 wrote to memory of 4432 4780 22fb4c623834ad8a3f602da708000647.exe 98 PID 4780 wrote to memory of 4540 4780 22fb4c623834ad8a3f602da708000647.exe 100 PID 4780 wrote to memory of 4540 4780 22fb4c623834ad8a3f602da708000647.exe 100 PID 4780 wrote to memory of 4540 4780 22fb4c623834ad8a3f602da708000647.exe 100 PID 4780 wrote to memory of 1672 4780 22fb4c623834ad8a3f602da708000647.exe 102 PID 4780 wrote to memory of 1672 4780 22fb4c623834ad8a3f602da708000647.exe 102 PID 4780 wrote to memory of 1672 4780 22fb4c623834ad8a3f602da708000647.exe 102 PID 4780 wrote to memory of 4136 4780 22fb4c623834ad8a3f602da708000647.exe 105 PID 4780 wrote to memory of 4136 4780 22fb4c623834ad8a3f602da708000647.exe 105 PID 4780 wrote to memory of 4136 4780 22fb4c623834ad8a3f602da708000647.exe 105 PID 1444 wrote to memory of 3136 1444 qlspolhi.exe 108 PID 1444 wrote to memory of 3136 1444 qlspolhi.exe 108 PID 1444 wrote to memory of 3136 1444 qlspolhi.exe 108 PID 1444 wrote to memory of 3136 1444 qlspolhi.exe 108 PID 1444 wrote to memory of 3136 1444 qlspolhi.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cysxlxuq\2⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qlspolhi.exe" C:\Windows\SysWOW64\cysxlxuq\2⤵PID:1904
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cysxlxuq binPath= "C:\Windows\SysWOW64\cysxlxuq\qlspolhi.exe /d\"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4432
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cysxlxuq "wifi internet conection"2⤵
- Launches sc.exe
PID:4540
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cysxlxuq2⤵
- Launches sc.exe
PID:1672
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 12722⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\cysxlxuq\qlspolhi.exeC:\Windows\SysWOW64\cysxlxuq\qlspolhi.exe /d"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 5162⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4780 -ip 47801⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1444 -ip 14441⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD564a72b093983b9375e471b44e23a49c4
SHA19cdd9b64f57cfcdd832b58f31a57f307dfe5e168
SHA256575a6298f091f2175d7ea4449555e78d4720ad9a792a854db4b92d3fd38463ae
SHA51244d8cf011e3d5875261123677d0d7f89c9d445cd7b239b9f95069a666230a7259c6991b2bc9412ab2a5bb91c62ead3e89941598965dc9a3e1082de4028e86955
-
Filesize
1024KB
MD596d7026c93102ba5c9963ea561654ee2
SHA19d687da8d3953e1ed00f012c45e89002baaaea1c
SHA25603bfa847e82617ace7eb3cde60ea985519b06327ea43124ee613fb6a55bde888
SHA5129012fc1fe10054328fbeae73ce4360775392089bc9ce1f05c5037daaa0cee16ef45ed6c8c5d11a614c50b37c343dfa5fd8dc82d85f3db37745021260ef472bad