Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
475dc421b8cf3050201ecf759cc19844.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
475dc421b8cf3050201ecf759cc19844.exe
Resource
win10v2004-20231215-en
General
-
Target
475dc421b8cf3050201ecf759cc19844.exe
-
Size
11.9MB
-
MD5
475dc421b8cf3050201ecf759cc19844
-
SHA1
eef39480edb6de6651af025696ee8f6cfcc9d250
-
SHA256
c427b8b15e5dca67b4b7c9fec0e4a7a461532bec32d38f47fba213c905ab731e
-
SHA512
69c7a9cd274167984c38fa917c0d7c97ef914330dd67f2e2f0797fb65919525567de46791d4f0cfffebbdd3f2bdb2767827fec6e5f49e800f0fa8ffde8f08065
-
SSDEEP
49152:fyjfVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV9:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\egsjwfkr = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2696 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\egsjwfkr\ImagePath = "C:\\Windows\\SysWOW64\\egsjwfkr\\glvqkwtv.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2412 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 glvqkwtv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2616 set thread context of 2412 2616 glvqkwtv.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2856 sc.exe 2280 sc.exe 2932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2392 1288 475dc421b8cf3050201ecf759cc19844.exe 29 PID 1288 wrote to memory of 2392 1288 475dc421b8cf3050201ecf759cc19844.exe 29 PID 1288 wrote to memory of 2392 1288 475dc421b8cf3050201ecf759cc19844.exe 29 PID 1288 wrote to memory of 2392 1288 475dc421b8cf3050201ecf759cc19844.exe 29 PID 1288 wrote to memory of 2784 1288 475dc421b8cf3050201ecf759cc19844.exe 31 PID 1288 wrote to memory of 2784 1288 475dc421b8cf3050201ecf759cc19844.exe 31 PID 1288 wrote to memory of 2784 1288 475dc421b8cf3050201ecf759cc19844.exe 31 PID 1288 wrote to memory of 2784 1288 475dc421b8cf3050201ecf759cc19844.exe 31 PID 1288 wrote to memory of 2856 1288 475dc421b8cf3050201ecf759cc19844.exe 33 PID 1288 wrote to memory of 2856 1288 475dc421b8cf3050201ecf759cc19844.exe 33 PID 1288 wrote to memory of 2856 1288 475dc421b8cf3050201ecf759cc19844.exe 33 PID 1288 wrote to memory of 2856 1288 475dc421b8cf3050201ecf759cc19844.exe 33 PID 1288 wrote to memory of 2280 1288 475dc421b8cf3050201ecf759cc19844.exe 35 PID 1288 wrote to memory of 2280 1288 475dc421b8cf3050201ecf759cc19844.exe 35 PID 1288 wrote to memory of 2280 1288 475dc421b8cf3050201ecf759cc19844.exe 35 PID 1288 wrote to memory of 2280 1288 475dc421b8cf3050201ecf759cc19844.exe 35 PID 1288 wrote to memory of 2932 1288 475dc421b8cf3050201ecf759cc19844.exe 37 PID 1288 wrote to memory of 2932 1288 475dc421b8cf3050201ecf759cc19844.exe 37 PID 1288 wrote to memory of 2932 1288 475dc421b8cf3050201ecf759cc19844.exe 37 PID 1288 wrote to memory of 2932 1288 475dc421b8cf3050201ecf759cc19844.exe 37 PID 1288 wrote to memory of 2696 1288 475dc421b8cf3050201ecf759cc19844.exe 38 PID 1288 wrote to memory of 2696 1288 475dc421b8cf3050201ecf759cc19844.exe 38 PID 1288 wrote to memory of 2696 1288 475dc421b8cf3050201ecf759cc19844.exe 38 PID 1288 wrote to memory of 2696 1288 475dc421b8cf3050201ecf759cc19844.exe 38 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41 PID 2616 wrote to memory of 2412 2616 glvqkwtv.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\475dc421b8cf3050201ecf759cc19844.exe"C:\Users\Admin\AppData\Local\Temp\475dc421b8cf3050201ecf759cc19844.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\egsjwfkr\2⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\glvqkwtv.exe" C:\Windows\SysWOW64\egsjwfkr\2⤵PID:2784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create egsjwfkr binPath= "C:\Windows\SysWOW64\egsjwfkr\glvqkwtv.exe /d\"C:\Users\Admin\AppData\Local\Temp\475dc421b8cf3050201ecf759cc19844.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description egsjwfkr "wifi internet conection"2⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start egsjwfkr2⤵
- Launches sc.exe
PID:2932
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2696
-
-
C:\Windows\SysWOW64\egsjwfkr\glvqkwtv.exeC:\Windows\SysWOW64\egsjwfkr\glvqkwtv.exe /d"C:\Users\Admin\AppData\Local\Temp\475dc421b8cf3050201ecf759cc19844.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54a002e0e739ab9ce8dde28fc837fdf2f
SHA140f0ca3e0c4c458146cadfae25467346512528ac
SHA25672e0466675069d25d2dd7c3b2bacf44fdaf49b3bf7005d6fc8ae60c19ae70fc1
SHA512e2b99aaf224f7ae1905386f7189c2973c641ced742ea56b0a49e452a27eff2c7c31b91e238f02556067cda859503847ca087954b31304d52fc333a4ef08453de