Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
750095c58829a6d8c2637a5533561606.exe
Resource
win7-20231215-en
General
-
Target
750095c58829a6d8c2637a5533561606.exe
-
Size
13.4MB
-
MD5
750095c58829a6d8c2637a5533561606
-
SHA1
85bba5814cf21b4427925ac0978751639c57ebc2
-
SHA256
702854337926972a29d67bfde8673fc202b696f2dfccf7fd21227632e4280737
-
SHA512
e91a9ec8f678071335b2ed0880cdc2375975dff6186633f03ac7a6584c415aac8da4ea1aead227cd5c74b030137c00ce4fa0ff70db80bba3df74d839c56b439a
-
SSDEEP
49152:Kj55555555555555555555555555555555555555555555555555555555555557:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\fayhiok = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2852 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fayhiok\ImagePath = "C:\\Windows\\SysWOW64\\fayhiok\\zqjmtgsr.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2660 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
zqjmtgsr.exepid process 2512 zqjmtgsr.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zqjmtgsr.exedescription pid process target process PID 2512 set thread context of 2660 2512 zqjmtgsr.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2708 sc.exe 1708 sc.exe 2792 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
750095c58829a6d8c2637a5533561606.exezqjmtgsr.exedescription pid process target process PID 1160 wrote to memory of 2860 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2860 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2860 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2860 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2940 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2940 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2940 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2940 1160 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1160 wrote to memory of 2708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 1708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 1708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 1708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 1708 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2792 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2792 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2792 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2792 1160 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1160 wrote to memory of 2852 1160 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 1160 wrote to memory of 2852 1160 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 1160 wrote to memory of 2852 1160 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 1160 wrote to memory of 2852 1160 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe PID 2512 wrote to memory of 2660 2512 zqjmtgsr.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fayhiok\2⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zqjmtgsr.exe" C:\Windows\SysWOW64\fayhiok\2⤵PID:2940
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fayhiok binPath= "C:\Windows\SysWOW64\fayhiok\zqjmtgsr.exe /d\"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2708 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fayhiok "wifi internet conection"2⤵
- Launches sc.exe
PID:1708 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fayhiok2⤵
- Launches sc.exe
PID:2792 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2852
-
C:\Windows\SysWOW64\fayhiok\zqjmtgsr.exeC:\Windows\SysWOW64\fayhiok\zqjmtgsr.exe /d"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\zqjmtgsr.exeFilesize
5.0MB
MD5aa6372baa1f336b0d3e0f3e2d655f16f
SHA1d2201e8968c92b710cc592ff7d84499477326210
SHA25601cdfa89e21dc43204c0c4518d2b49077fa59aa11ba8259dd7c95f2f0473cf8d
SHA512049fab8f000e2ed44694a5b44cf6a312ac73d217d6e62637e93c3d0050384b3205bf0688dcba07f954524acd24d7b235e2060140ade2d27b5ee2f34ffdc2b513
-
C:\Windows\SysWOW64\fayhiok\zqjmtgsr.exeFilesize
13.8MB
MD56c9558d9a04706858a301e3c1549e272
SHA199c4174b33b24674c236740ba5b011b6fec7e26c
SHA25625818f3e05b95bd3671d4c726dcd77fe8b2ccd2da80e3e652ad3a5d20d7ae528
SHA512a1796da17e0655e174c6c4dcf1cb3d268aba08871aa3eeeb259696b8611ec11e8e079d6399ea50d12e394c4281d96ee7783ef6f0c46c96fb5d27cdbe7b08d1b9
-
memory/1160-1-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-2-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1160-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1160-6-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1160-0-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2512-9-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2512-8-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2512-17-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2660-11-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2660-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2660-14-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2660-19-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2660-20-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2660-21-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB