Analysis
-
max time kernel
3s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
4585fb3371e05463f51493e049181ed6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4585fb3371e05463f51493e049181ed6.exe
Resource
win10v2004-20231215-en
General
-
Target
4585fb3371e05463f51493e049181ed6.exe
-
Size
13.6MB
-
MD5
4585fb3371e05463f51493e049181ed6
-
SHA1
1d50b71e1238537c4deeff3825741771f2bb9165
-
SHA256
5583cf616f524b652e3a55b0d5ae610b1326d04842873d5d202e762d8b541548
-
SHA512
4ad2424a021e17bd4ac285d9e8e164d31d6604cb206cecd6d2cf5c905b3e63255fc9e182883d9d253abc428ab4ebddef25006d50a0986622dca13ef8cb0c6c1a
-
SSDEEP
49152:FgMttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttr:F
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2744 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2704 sc.exe 2856 sc.exe 3056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2688 2100 4585fb3371e05463f51493e049181ed6.exe 28 PID 2100 wrote to memory of 2688 2100 4585fb3371e05463f51493e049181ed6.exe 28 PID 2100 wrote to memory of 2688 2100 4585fb3371e05463f51493e049181ed6.exe 28 PID 2100 wrote to memory of 2688 2100 4585fb3371e05463f51493e049181ed6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4585fb3371e05463f51493e049181ed6.exe"C:\Users\Admin\AppData\Local\Temp\4585fb3371e05463f51493e049181ed6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vzhisaym\2⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\embfsqzz.exe" C:\Windows\SysWOW64\vzhisaym\2⤵PID:2996
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vzhisaym binPath= "C:\Windows\SysWOW64\vzhisaym\embfsqzz.exe /d\"C:\Users\Admin\AppData\Local\Temp\4585fb3371e05463f51493e049181ed6.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vzhisaym "wifi internet conection"2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vzhisaym2⤵
- Launches sc.exe
PID:3056
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2744
-
-
C:\Windows\SysWOW64\vzhisaym\embfsqzz.exeC:\Windows\SysWOW64\vzhisaym\embfsqzz.exe /d"C:\Users\Admin\AppData\Local\Temp\4585fb3371e05463f51493e049181ed6.exe"1⤵PID:832
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1136
-