Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
5a07cc8e36f22b398224b6685f28475b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a07cc8e36f22b398224b6685f28475b.exe
Resource
win10v2004-20231215-en
General
-
Target
5a07cc8e36f22b398224b6685f28475b.exe
-
Size
13.2MB
-
MD5
5a07cc8e36f22b398224b6685f28475b
-
SHA1
10dba11f9e2080f7bc2fb2da7a768eb9a4bde53f
-
SHA256
81c24a66dbb0f2f3c18d2d88f300fb0c93915af3f2f908b4659665a344d92a36
-
SHA512
1a1fa5ff1c2ea6d9caeee53d605d9c905ab2960a2238a7d8c89f45ea1f67cb85f83fcbb956bfbf8859e5fff6fff49b85b55c252c30c307e1a0639484f7878a92
-
SSDEEP
49152:rGvEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEn:rG
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1836 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\oxynlxak\ImagePath = "C:\\Windows\\SysWOW64\\oxynlxak\\ldrftsic.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5a07cc8e36f22b398224b6685f28475b.exe -
Deletes itself 1 IoCs
pid Process 2736 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 ldrftsic.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 2736 2420 ldrftsic.exe 111 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3796 sc.exe 4504 sc.exe 4252 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2260 3216 WerFault.exe 86 4260 2420 WerFault.exe 105 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3160 3216 5a07cc8e36f22b398224b6685f28475b.exe 92 PID 3216 wrote to memory of 3160 3216 5a07cc8e36f22b398224b6685f28475b.exe 92 PID 3216 wrote to memory of 3160 3216 5a07cc8e36f22b398224b6685f28475b.exe 92 PID 3216 wrote to memory of 228 3216 5a07cc8e36f22b398224b6685f28475b.exe 94 PID 3216 wrote to memory of 228 3216 5a07cc8e36f22b398224b6685f28475b.exe 94 PID 3216 wrote to memory of 228 3216 5a07cc8e36f22b398224b6685f28475b.exe 94 PID 3216 wrote to memory of 4504 3216 5a07cc8e36f22b398224b6685f28475b.exe 96 PID 3216 wrote to memory of 4504 3216 5a07cc8e36f22b398224b6685f28475b.exe 96 PID 3216 wrote to memory of 4504 3216 5a07cc8e36f22b398224b6685f28475b.exe 96 PID 3216 wrote to memory of 4252 3216 5a07cc8e36f22b398224b6685f28475b.exe 98 PID 3216 wrote to memory of 4252 3216 5a07cc8e36f22b398224b6685f28475b.exe 98 PID 3216 wrote to memory of 4252 3216 5a07cc8e36f22b398224b6685f28475b.exe 98 PID 3216 wrote to memory of 3796 3216 5a07cc8e36f22b398224b6685f28475b.exe 100 PID 3216 wrote to memory of 3796 3216 5a07cc8e36f22b398224b6685f28475b.exe 100 PID 3216 wrote to memory of 3796 3216 5a07cc8e36f22b398224b6685f28475b.exe 100 PID 3216 wrote to memory of 1836 3216 5a07cc8e36f22b398224b6685f28475b.exe 102 PID 3216 wrote to memory of 1836 3216 5a07cc8e36f22b398224b6685f28475b.exe 102 PID 3216 wrote to memory of 1836 3216 5a07cc8e36f22b398224b6685f28475b.exe 102 PID 2420 wrote to memory of 2736 2420 ldrftsic.exe 111 PID 2420 wrote to memory of 2736 2420 ldrftsic.exe 111 PID 2420 wrote to memory of 2736 2420 ldrftsic.exe 111 PID 2420 wrote to memory of 2736 2420 ldrftsic.exe 111 PID 2420 wrote to memory of 2736 2420 ldrftsic.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a07cc8e36f22b398224b6685f28475b.exe"C:\Users\Admin\AppData\Local\Temp\5a07cc8e36f22b398224b6685f28475b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oxynlxak\2⤵PID:3160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ldrftsic.exe" C:\Windows\SysWOW64\oxynlxak\2⤵PID:228
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create oxynlxak binPath= "C:\Windows\SysWOW64\oxynlxak\ldrftsic.exe /d\"C:\Users\Admin\AppData\Local\Temp\5a07cc8e36f22b398224b6685f28475b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description oxynlxak "wifi internet conection"2⤵
- Launches sc.exe
PID:4252
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oxynlxak2⤵
- Launches sc.exe
PID:3796
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 6522⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3216 -ip 32161⤵PID:3528
-
C:\Windows\SysWOW64\oxynlxak\ldrftsic.exeC:\Windows\SysWOW64\oxynlxak\ldrftsic.exe /d"C:\Users\Admin\AppData\Local\Temp\5a07cc8e36f22b398224b6685f28475b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 5082⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2420 -ip 24201⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD5a9273cb1e97c8c2b5d9c9133c020ce89
SHA1fd33889518622a43673d1790272b5af341ad9dc0
SHA2565916d6f0a4a2b0da03e93c1577da19e5730d331f11ce69ff1ac03ed8b059d2a6
SHA5127c0dd914369223d59b5d1975532f3b53b08bc47e35f9549b0c05b8e9667382b5c8ddbb5154c408dd11e46e1e434bac0d85459a3f934b2568a79926252571df73