Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
26c40137d44baffaed0feef784b5a6bd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26c40137d44baffaed0feef784b5a6bd.exe
Resource
win10v2004-20231215-en
General
-
Target
26c40137d44baffaed0feef784b5a6bd.exe
-
Size
14.7MB
-
MD5
26c40137d44baffaed0feef784b5a6bd
-
SHA1
cbd0f74afe260641d62a4020e6d3f00d56c14e75
-
SHA256
5363de7557a8cea70d59831cdeb9f42268f0d8628168c343bcd8f09851d0b6c2
-
SHA512
12f9c4a04590c72c75796eebcd06e7f8f7c94bd5495c57dee75ab9abbf6d3c8bca8be8edb4d86e2a17cff88116c4449fba491b201cf194859c259f75ae98b4c3
-
SSDEEP
98304:Bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffn:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 444 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hvlzqgqb\ImagePath = "C:\\Windows\\SysWOW64\\hvlzqgqb\\bnoidzax.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 26c40137d44baffaed0feef784b5a6bd.exe -
Deletes itself 1 IoCs
pid Process 1472 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 912 bnoidzax.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 912 set thread context of 1472 912 bnoidzax.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4676 sc.exe 2204 sc.exe 3020 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1384 3768 26c40137d44baffaed0feef784b5a6bd.exe 92 PID 3768 wrote to memory of 1384 3768 26c40137d44baffaed0feef784b5a6bd.exe 92 PID 3768 wrote to memory of 1384 3768 26c40137d44baffaed0feef784b5a6bd.exe 92 PID 3768 wrote to memory of 4792 3768 26c40137d44baffaed0feef784b5a6bd.exe 93 PID 3768 wrote to memory of 4792 3768 26c40137d44baffaed0feef784b5a6bd.exe 93 PID 3768 wrote to memory of 4792 3768 26c40137d44baffaed0feef784b5a6bd.exe 93 PID 3768 wrote to memory of 3020 3768 26c40137d44baffaed0feef784b5a6bd.exe 96 PID 3768 wrote to memory of 3020 3768 26c40137d44baffaed0feef784b5a6bd.exe 96 PID 3768 wrote to memory of 3020 3768 26c40137d44baffaed0feef784b5a6bd.exe 96 PID 3768 wrote to memory of 4676 3768 26c40137d44baffaed0feef784b5a6bd.exe 99 PID 3768 wrote to memory of 4676 3768 26c40137d44baffaed0feef784b5a6bd.exe 99 PID 3768 wrote to memory of 4676 3768 26c40137d44baffaed0feef784b5a6bd.exe 99 PID 3768 wrote to memory of 2204 3768 26c40137d44baffaed0feef784b5a6bd.exe 100 PID 3768 wrote to memory of 2204 3768 26c40137d44baffaed0feef784b5a6bd.exe 100 PID 3768 wrote to memory of 2204 3768 26c40137d44baffaed0feef784b5a6bd.exe 100 PID 912 wrote to memory of 1472 912 bnoidzax.exe 103 PID 912 wrote to memory of 1472 912 bnoidzax.exe 103 PID 912 wrote to memory of 1472 912 bnoidzax.exe 103 PID 912 wrote to memory of 1472 912 bnoidzax.exe 103 PID 912 wrote to memory of 1472 912 bnoidzax.exe 103 PID 3768 wrote to memory of 444 3768 26c40137d44baffaed0feef784b5a6bd.exe 105 PID 3768 wrote to memory of 444 3768 26c40137d44baffaed0feef784b5a6bd.exe 105 PID 3768 wrote to memory of 444 3768 26c40137d44baffaed0feef784b5a6bd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe"C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hvlzqgqb\2⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bnoidzax.exe" C:\Windows\SysWOW64\hvlzqgqb\2⤵PID:4792
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hvlzqgqb binPath= "C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe /d\"C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3020
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hvlzqgqb "wifi internet conection"2⤵
- Launches sc.exe
PID:4676
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hvlzqgqb2⤵
- Launches sc.exe
PID:2204
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:444
-
-
C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exeC:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe /d"C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c6726c91a1c7061468baa99d3d91eec9
SHA1a5df3db886c055a446b1b4df06df8daa78823e3d
SHA256af2526d928d2b8ce0436d0586968512f6666f2b6f629a7828cefc28e48053d8a
SHA5127918fdf85972f4778e0da7ec11247f14874afb5f857822929b2d1db40a3a0fe947252fb62ac63e45bf2a1a27a5e0b72d3d0efd939b68fa0496dcba591622d92d
-
Filesize
1.3MB
MD57770dad781f42d9baf4a332be80348c0
SHA12315b07fbde7dc3559360427193c3347888e6753
SHA256698ecc11657305a7dcd30c8a7ab92e4613be779da4b698cf67104770f5ab3bf8
SHA51227e0a5f3df0da8bd20c5d7210aef7473003a92438cb164fecefcf160e6f7f4918731e7f2333e98862b8c887f7f512228edeaaacfb71e3e8b78a176dbbabde2b3