Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
65c0ab98adcba2c36a8da6d36a1b12d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65c0ab98adcba2c36a8da6d36a1b12d8.exe
Resource
win10v2004-20231222-en
General
-
Target
65c0ab98adcba2c36a8da6d36a1b12d8.exe
-
Size
11.7MB
-
MD5
65c0ab98adcba2c36a8da6d36a1b12d8
-
SHA1
b68e7f29929883834dc771c5b61732f10503ab7e
-
SHA256
74bd2e5d66d6ccb15a6ff3ece5ec2f56dafe6fffb201d73c0a9f1d06818542f1
-
SHA512
6931e99653ce5ebe1375aa050dceaa04c0bde1bb69929a8f8998ec8268c093d7362a76c5ad7557a1ed8cd089a89a44fc0498c8ee7fa5c4da18842cf26772136c
-
SSDEEP
6144:bnqXDHjKw5RZmN+RrjeO6wWSLL78/nk5agPEWHtIhiiiiiiiiiiiiiiiiiiiiiiz:+XbjKw5bmN+RPWcLI/niag8E
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4616 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nqtwzyye\ImagePath = "C:\\Windows\\SysWOW64\\nqtwzyye\\ntephwqc.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 65c0ab98adcba2c36a8da6d36a1b12d8.exe -
Deletes itself 1 IoCs
pid Process 4552 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 ntephwqc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 4552 2504 ntephwqc.exe 114 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 636 sc.exe 1972 sc.exe 3312 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3516 3076 WerFault.exe 88 4432 2504 WerFault.exe 105 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3076 wrote to memory of 5052 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 93 PID 3076 wrote to memory of 5052 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 93 PID 3076 wrote to memory of 5052 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 93 PID 3076 wrote to memory of 3872 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 96 PID 3076 wrote to memory of 3872 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 96 PID 3076 wrote to memory of 3872 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 96 PID 3076 wrote to memory of 636 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 99 PID 3076 wrote to memory of 636 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 99 PID 3076 wrote to memory of 636 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 99 PID 3076 wrote to memory of 1972 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 102 PID 3076 wrote to memory of 1972 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 102 PID 3076 wrote to memory of 1972 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 102 PID 3076 wrote to memory of 3312 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 103 PID 3076 wrote to memory of 3312 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 103 PID 3076 wrote to memory of 3312 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 103 PID 3076 wrote to memory of 4616 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 108 PID 3076 wrote to memory of 4616 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 108 PID 3076 wrote to memory of 4616 3076 65c0ab98adcba2c36a8da6d36a1b12d8.exe 108 PID 2504 wrote to memory of 4552 2504 ntephwqc.exe 114 PID 2504 wrote to memory of 4552 2504 ntephwqc.exe 114 PID 2504 wrote to memory of 4552 2504 ntephwqc.exe 114 PID 2504 wrote to memory of 4552 2504 ntephwqc.exe 114 PID 2504 wrote to memory of 4552 2504 ntephwqc.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\65c0ab98adcba2c36a8da6d36a1b12d8.exe"C:\Users\Admin\AppData\Local\Temp\65c0ab98adcba2c36a8da6d36a1b12d8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nqtwzyye\2⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ntephwqc.exe" C:\Windows\SysWOW64\nqtwzyye\2⤵PID:3872
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nqtwzyye binPath= "C:\Windows\SysWOW64\nqtwzyye\ntephwqc.exe /d\"C:\Users\Admin\AppData\Local\Temp\65c0ab98adcba2c36a8da6d36a1b12d8.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:636
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nqtwzyye "wifi internet conection"2⤵
- Launches sc.exe
PID:1972
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nqtwzyye2⤵
- Launches sc.exe
PID:3312
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 12242⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\nqtwzyye\ntephwqc.exeC:\Windows\SysWOW64\nqtwzyye\ntephwqc.exe /d"C:\Users\Admin\AppData\Local\Temp\65c0ab98adcba2c36a8da6d36a1b12d8.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 5162⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3076 -ip 30761⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2504 -ip 25041⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5d453126a88ed9bde5041e5514e093b96
SHA1e6ff7250e841e6daa5f1b59184378e9482585d25
SHA2567275a94c0519a1425134c22d5ba389920b0faf1b80ced9981a9d3d9aac4411a1
SHA51222615c6641956cf363869b9c504789ad168c434eb8705ce67a2180b276921595dad8c6dd52cb36a98dd4a5b4c80492e5fad362506ec383b2fa4cb15f0e5de820
-
Filesize
1.5MB
MD5668f264d5222368eb1a7ece718bc282e
SHA11e97960fee0497e2cee07252b763fb627add4460
SHA2561a197bf9cfc58be3b3ec2b8e6468b6b56f172ae249dc5fe796e1becb386d7638
SHA51273b1d0623cff435244820f9d870ff0fcc376c2fbb8895b0fa5a076ad4fdb413dec99f80a0a863b8e8ad52380b22813a1f7ad67f1d566a1762eb05425250b1641