Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:42
Static task
static1
Behavioral task
behavioral1
Sample
24e7e55104c81fd3475a9ef3c5793e0d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24e7e55104c81fd3475a9ef3c5793e0d.exe
Resource
win10v2004-20231222-en
General
-
Target
24e7e55104c81fd3475a9ef3c5793e0d.exe
-
Size
13.5MB
-
MD5
24e7e55104c81fd3475a9ef3c5793e0d
-
SHA1
2e0199e1d53bb01fa88627c635eeb7a536b423f3
-
SHA256
bc9ad68ce7fadb5334dcad56464a9f19bd010f91d042146efd475ee75cd66fcf
-
SHA512
7780247138929e6b0f7301341192e02ffe3f8f9c94ee940872297aca2493d6d5e92f212acf909379c0c680e9b687f5bb27caba32308da5b1704ed9156200d9e0
-
SSDEEP
49152:V1yvllllllllllllllllllllllllllllllllllllllllllllllllllllllllllln:VA
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2608 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 cexipxlb.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2280 sc.exe 2720 sc.exe 2576 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2660 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 29 PID 1288 wrote to memory of 2660 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 29 PID 1288 wrote to memory of 2660 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 29 PID 1288 wrote to memory of 2660 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 29 PID 1288 wrote to memory of 2776 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 31 PID 1288 wrote to memory of 2776 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 31 PID 1288 wrote to memory of 2776 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 31 PID 1288 wrote to memory of 2776 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 31 PID 1288 wrote to memory of 2720 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 33 PID 1288 wrote to memory of 2720 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 33 PID 1288 wrote to memory of 2720 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 33 PID 1288 wrote to memory of 2720 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 33 PID 1288 wrote to memory of 2576 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 35 PID 1288 wrote to memory of 2576 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 35 PID 1288 wrote to memory of 2576 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 35 PID 1288 wrote to memory of 2576 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 35 PID 1288 wrote to memory of 2280 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 36 PID 1288 wrote to memory of 2280 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 36 PID 1288 wrote to memory of 2280 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 36 PID 1288 wrote to memory of 2280 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 36 PID 1288 wrote to memory of 2608 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 38 PID 1288 wrote to memory of 2608 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 38 PID 1288 wrote to memory of 2608 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 38 PID 1288 wrote to memory of 2608 1288 24e7e55104c81fd3475a9ef3c5793e0d.exe 38 PID 1248 wrote to memory of 1100 1248 cexipxlb.exe 43 PID 1248 wrote to memory of 1100 1248 cexipxlb.exe 43 PID 1248 wrote to memory of 1100 1248 cexipxlb.exe 43 PID 1248 wrote to memory of 1100 1248 cexipxlb.exe 43 PID 1248 wrote to memory of 1100 1248 cexipxlb.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\24e7e55104c81fd3475a9ef3c5793e0d.exe"C:\Users\Admin\AppData\Local\Temp\24e7e55104c81fd3475a9ef3c5793e0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\mfdnzsea\2⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cexipxlb.exe" C:\Windows\SysWOW64\mfdnzsea\2⤵PID:2776
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create mfdnzsea binPath= "C:\Windows\SysWOW64\mfdnzsea\cexipxlb.exe /d\"C:\Users\Admin\AppData\Local\Temp\24e7e55104c81fd3475a9ef3c5793e0d.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description mfdnzsea "wifi internet conection"2⤵
- Launches sc.exe
PID:2576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start mfdnzsea2⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2608
-
-
C:\Windows\SysWOW64\mfdnzsea\cexipxlb.exeC:\Windows\SysWOW64\mfdnzsea\cexipxlb.exe /d"C:\Users\Admin\AppData\Local\Temp\24e7e55104c81fd3475a9ef3c5793e0d.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5f9dd9cdb46cded74974bb61ed060c9f8
SHA1239b895fa4c4464a8e8449fe04bf2f3bf7dbed22
SHA2562619b42c0246a04e2472181c08d206e118ff005215e1ce84df1bb29b2559b3cf
SHA512fd96ab69bb22abf09d1ee84783573c0b9b28ed7d451dbc9eff73f5fd721317e31d5718a6f1b13a3c66632ba2f3ead2c01a4119ffebdc5668f9d95340fa5ebba5
-
Filesize
384KB
MD538d512aee5a005b77aa75d21fb6d2c27
SHA1123729dba371fff7bf45edaa6c09a6991780012c
SHA2560ec70c0007af64bc45db42038ce7c283c5730a02c49f347e162f3613c3347f82
SHA51205dd56082c94f124632d49011b1bc0da236db692d354f3531e88a477aeb1e93f393ba226651db3b247e0d45157ed0f9dad054913280d8f3c18fa7d7d91bccc39