Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
6744b518ec9ccb2012bdbf736c7e187a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6744b518ec9ccb2012bdbf736c7e187a.exe
Resource
win10v2004-20231215-en
General
-
Target
6744b518ec9ccb2012bdbf736c7e187a.exe
-
Size
13.2MB
-
MD5
6744b518ec9ccb2012bdbf736c7e187a
-
SHA1
2d1197901aca6e7e331319a57ac3eeaf15245731
-
SHA256
74868d600acb1c900eb7643f849d64b4e029a0417d091b1833672bbc0eaf49a1
-
SHA512
d3b84833a751b58d70d3e590df0982c5965d8cfa81bfcce9eeca47dff42355201dc30d396a7ea69ec49823ee874c29ed4bf97a069aeabfe393e45bebc2cd2f77
-
SSDEEP
49152:NgMtttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt1:N
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1068 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ycjpqvtx\ImagePath = "C:\\Windows\\SysWOW64\\ycjpqvtx\\owlpcajj.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 6744b518ec9ccb2012bdbf736c7e187a.exe -
Deletes itself 1 IoCs
pid Process 3624 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 owlpcajj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 3624 2008 owlpcajj.exe 109 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3264 sc.exe 4032 sc.exe 3784 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4880 364 WerFault.exe 84 1164 2008 WerFault.exe 102 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 364 wrote to memory of 2304 364 6744b518ec9ccb2012bdbf736c7e187a.exe 88 PID 364 wrote to memory of 2304 364 6744b518ec9ccb2012bdbf736c7e187a.exe 88 PID 364 wrote to memory of 2304 364 6744b518ec9ccb2012bdbf736c7e187a.exe 88 PID 364 wrote to memory of 2356 364 6744b518ec9ccb2012bdbf736c7e187a.exe 92 PID 364 wrote to memory of 2356 364 6744b518ec9ccb2012bdbf736c7e187a.exe 92 PID 364 wrote to memory of 2356 364 6744b518ec9ccb2012bdbf736c7e187a.exe 92 PID 364 wrote to memory of 3784 364 6744b518ec9ccb2012bdbf736c7e187a.exe 94 PID 364 wrote to memory of 3784 364 6744b518ec9ccb2012bdbf736c7e187a.exe 94 PID 364 wrote to memory of 3784 364 6744b518ec9ccb2012bdbf736c7e187a.exe 94 PID 364 wrote to memory of 3264 364 6744b518ec9ccb2012bdbf736c7e187a.exe 98 PID 364 wrote to memory of 3264 364 6744b518ec9ccb2012bdbf736c7e187a.exe 98 PID 364 wrote to memory of 3264 364 6744b518ec9ccb2012bdbf736c7e187a.exe 98 PID 364 wrote to memory of 4032 364 6744b518ec9ccb2012bdbf736c7e187a.exe 100 PID 364 wrote to memory of 4032 364 6744b518ec9ccb2012bdbf736c7e187a.exe 100 PID 364 wrote to memory of 4032 364 6744b518ec9ccb2012bdbf736c7e187a.exe 100 PID 364 wrote to memory of 1068 364 6744b518ec9ccb2012bdbf736c7e187a.exe 105 PID 364 wrote to memory of 1068 364 6744b518ec9ccb2012bdbf736c7e187a.exe 105 PID 364 wrote to memory of 1068 364 6744b518ec9ccb2012bdbf736c7e187a.exe 105 PID 2008 wrote to memory of 3624 2008 owlpcajj.exe 109 PID 2008 wrote to memory of 3624 2008 owlpcajj.exe 109 PID 2008 wrote to memory of 3624 2008 owlpcajj.exe 109 PID 2008 wrote to memory of 3624 2008 owlpcajj.exe 109 PID 2008 wrote to memory of 3624 2008 owlpcajj.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ycjpqvtx\2⤵PID:2304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\owlpcajj.exe" C:\Windows\SysWOW64\ycjpqvtx\2⤵PID:2356
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ycjpqvtx binPath= "C:\Windows\SysWOW64\ycjpqvtx\owlpcajj.exe /d\"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ycjpqvtx "wifi internet conection"2⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ycjpqvtx2⤵
- Launches sc.exe
PID:4032
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 6562⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\ycjpqvtx\owlpcajj.exeC:\Windows\SysWOW64\ycjpqvtx\owlpcajj.exe /d"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 5202⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 364 -ip 3641⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2008 -ip 20081⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5eeecca62f22f035068f29dfa7e2ba566
SHA134d1385237ca686f13b1379457ab3c53c2f57fcc
SHA25615fed14ae0846bbf4b902f3128e694a71c580e3bdfdea2b94f99b659158ec91d
SHA51260c506e34dfd494dcc7fce75997141d727a1019414485a673aed542ac5d21d5ed721096dd37838910d8584ac6f2759bc41d6a6721dc2dc50eefd69c626f8a900
-
Filesize
3.2MB
MD5b75573fe06c7315fd169a529c9bdf207
SHA13b04aa32ab6c2dcfa7215c76dd124f856e6ac6d7
SHA256519a4f613d52ed889d93ed564d3a9a00f22f5b3a91a2b6546cad854527fa4314
SHA5121fd87c18a0124d714bf673cbb26cebab1d76084c1c6ff0cf28c8b181a15c3140e70aff834e5a179ec674d007b0b118afc7f63952913c92e258fae453e2e1d40b