Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:57
Static task
static1
Behavioral task
behavioral1
Sample
000308f3e95064bc9116bcfcff9bd464.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
000308f3e95064bc9116bcfcff9bd464.exe
Resource
win10v2004-20231215-en
General
-
Target
000308f3e95064bc9116bcfcff9bd464.exe
-
Size
12.5MB
-
MD5
000308f3e95064bc9116bcfcff9bd464
-
SHA1
6a4b7f0d3ccb0a40a21265e14fa60bbfc5162bc8
-
SHA256
96d8d4d0cd9304b198005109fc99354a3a353f5f03a9aaf1ddbf0baa179ab0cf
-
SHA512
f5efd2c6728a3d12a83efca5dd0a979f34e9af3a7859d1010fafea300f4dd58d34e208f3b3bf3ffb8ca254ea3236957ca650e28c6c02391bbaffeb7f9a833d3c
-
SSDEEP
98304:qvjOF//////////////////////////////////////////////////////////H:c
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\nnvufepi = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2712 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\nnvufepi\ImagePath = "C:\\Windows\\SysWOW64\\nnvufepi\\yatelthx.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2556 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 yatelthx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2556 2564 yatelthx.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2132 sc.exe 2076 sc.exe 2696 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2352 2196 000308f3e95064bc9116bcfcff9bd464.exe 28 PID 2196 wrote to memory of 2352 2196 000308f3e95064bc9116bcfcff9bd464.exe 28 PID 2196 wrote to memory of 2352 2196 000308f3e95064bc9116bcfcff9bd464.exe 28 PID 2196 wrote to memory of 2352 2196 000308f3e95064bc9116bcfcff9bd464.exe 28 PID 2196 wrote to memory of 1644 2196 000308f3e95064bc9116bcfcff9bd464.exe 30 PID 2196 wrote to memory of 1644 2196 000308f3e95064bc9116bcfcff9bd464.exe 30 PID 2196 wrote to memory of 1644 2196 000308f3e95064bc9116bcfcff9bd464.exe 30 PID 2196 wrote to memory of 1644 2196 000308f3e95064bc9116bcfcff9bd464.exe 30 PID 2196 wrote to memory of 2132 2196 000308f3e95064bc9116bcfcff9bd464.exe 32 PID 2196 wrote to memory of 2132 2196 000308f3e95064bc9116bcfcff9bd464.exe 32 PID 2196 wrote to memory of 2132 2196 000308f3e95064bc9116bcfcff9bd464.exe 32 PID 2196 wrote to memory of 2132 2196 000308f3e95064bc9116bcfcff9bd464.exe 32 PID 2196 wrote to memory of 2076 2196 000308f3e95064bc9116bcfcff9bd464.exe 35 PID 2196 wrote to memory of 2076 2196 000308f3e95064bc9116bcfcff9bd464.exe 35 PID 2196 wrote to memory of 2076 2196 000308f3e95064bc9116bcfcff9bd464.exe 35 PID 2196 wrote to memory of 2076 2196 000308f3e95064bc9116bcfcff9bd464.exe 35 PID 2196 wrote to memory of 2696 2196 000308f3e95064bc9116bcfcff9bd464.exe 37 PID 2196 wrote to memory of 2696 2196 000308f3e95064bc9116bcfcff9bd464.exe 37 PID 2196 wrote to memory of 2696 2196 000308f3e95064bc9116bcfcff9bd464.exe 37 PID 2196 wrote to memory of 2696 2196 000308f3e95064bc9116bcfcff9bd464.exe 37 PID 2196 wrote to memory of 2712 2196 000308f3e95064bc9116bcfcff9bd464.exe 40 PID 2196 wrote to memory of 2712 2196 000308f3e95064bc9116bcfcff9bd464.exe 40 PID 2196 wrote to memory of 2712 2196 000308f3e95064bc9116bcfcff9bd464.exe 40 PID 2196 wrote to memory of 2712 2196 000308f3e95064bc9116bcfcff9bd464.exe 40 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41 PID 2564 wrote to memory of 2556 2564 yatelthx.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\000308f3e95064bc9116bcfcff9bd464.exe"C:\Users\Admin\AppData\Local\Temp\000308f3e95064bc9116bcfcff9bd464.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nnvufepi\2⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yatelthx.exe" C:\Windows\SysWOW64\nnvufepi\2⤵PID:1644
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nnvufepi binPath= "C:\Windows\SysWOW64\nnvufepi\yatelthx.exe /d\"C:\Users\Admin\AppData\Local\Temp\000308f3e95064bc9116bcfcff9bd464.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2132
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nnvufepi "wifi internet conection"2⤵
- Launches sc.exe
PID:2076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nnvufepi2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2712
-
-
C:\Windows\SysWOW64\nnvufepi\yatelthx.exeC:\Windows\SysWOW64\nnvufepi\yatelthx.exe /d"C:\Users\Admin\AppData\Local\Temp\000308f3e95064bc9116bcfcff9bd464.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD58a494ccfd4301e68fa2b6970a5efbca1
SHA17a61c3ca8ab092d6477f2f53dcbb34b2d210c57c
SHA256e510aaa0f4981b67fd8c486badf83db3bcda076e63dd45db23824127473b6094
SHA512cca942ea0ef9e1d115bccaaa76ecb46dcef5ef078dbab852b51552ac56a67a9398faff1b9fcd2901ca562f2a14271deec19192cb4848a0905a28721add98c0b7
-
Filesize
2.8MB
MD515081dfdf5b178b870caf63df5ef20c9
SHA1f5b996a640a10d37cacafca7669884e3abadccdc
SHA2565a3fa242430eba1d58c92871a3d6b950b4d3be819689b0c0cbf5d303b7a1f929
SHA5122c6577e0c51fb1863569c2a2f0be18f3eb55683682a392ec6ac553662be02ee20e74c03d35b6f622a8946911d9fd6eff8d2d419567dae568531ab39b543a5938