Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
750095c58829a6d8c2637a5533561606.exe
Resource
win7-20231215-en
General
-
Target
750095c58829a6d8c2637a5533561606.exe
-
Size
13.4MB
-
MD5
750095c58829a6d8c2637a5533561606
-
SHA1
85bba5814cf21b4427925ac0978751639c57ebc2
-
SHA256
702854337926972a29d67bfde8673fc202b696f2dfccf7fd21227632e4280737
-
SHA512
e91a9ec8f678071335b2ed0880cdc2375975dff6186633f03ac7a6584c415aac8da4ea1aead227cd5c74b030137c00ce4fa0ff70db80bba3df74d839c56b439a
-
SSDEEP
49152:Kj55555555555555555555555555555555555555555555555555555555555557:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4580 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qbhvippe\ImagePath = "C:\\Windows\\SysWOW64\\qbhvippe\\wwvbmahk.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
750095c58829a6d8c2637a5533561606.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 750095c58829a6d8c2637a5533561606.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3772 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
wwvbmahk.exepid process 2696 wwvbmahk.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wwvbmahk.exedescription pid process target process PID 2696 set thread context of 3772 2696 wwvbmahk.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4976 sc.exe 4992 sc.exe 932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
750095c58829a6d8c2637a5533561606.exewwvbmahk.exedescription pid process target process PID 1628 wrote to memory of 1432 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 1432 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 1432 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 4472 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 4472 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 4472 1628 750095c58829a6d8c2637a5533561606.exe cmd.exe PID 1628 wrote to memory of 4976 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4976 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4976 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4992 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4992 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4992 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 932 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 932 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 932 1628 750095c58829a6d8c2637a5533561606.exe sc.exe PID 1628 wrote to memory of 4580 1628 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 1628 wrote to memory of 4580 1628 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 1628 wrote to memory of 4580 1628 750095c58829a6d8c2637a5533561606.exe netsh.exe PID 2696 wrote to memory of 3772 2696 wwvbmahk.exe svchost.exe PID 2696 wrote to memory of 3772 2696 wwvbmahk.exe svchost.exe PID 2696 wrote to memory of 3772 2696 wwvbmahk.exe svchost.exe PID 2696 wrote to memory of 3772 2696 wwvbmahk.exe svchost.exe PID 2696 wrote to memory of 3772 2696 wwvbmahk.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qbhvippe\2⤵PID:1432
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wwvbmahk.exe" C:\Windows\SysWOW64\qbhvippe\2⤵PID:4472
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qbhvippe binPath= "C:\Windows\SysWOW64\qbhvippe\wwvbmahk.exe /d\"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4976 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qbhvippe "wifi internet conection"2⤵
- Launches sc.exe
PID:4992 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qbhvippe2⤵
- Launches sc.exe
PID:932 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4580
-
C:\Windows\SysWOW64\qbhvippe\wwvbmahk.exeC:\Windows\SysWOW64\qbhvippe\wwvbmahk.exe /d"C:\Users\Admin\AppData\Local\Temp\750095c58829a6d8c2637a5533561606.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD5891461a241c243b808bc89d3ef818953
SHA1c21b9e8885c3f73ce419f91eedca4506ccc34214
SHA2568a8bd6c6e3c9d96b1697a0ff1701622300b2ce51e1b16b8c2b978528a3df13ef
SHA51235536e8a1a8ea1d376e542c71bf8c6acb607e584fd8261482a114a5fbe0cde54957beb1c0633f31131c0397f5485c9e16e46dfb60482e8be66647e3977872193
-
Filesize
12.0MB
MD51258a3139d4145cdbd79f29dc4e12054
SHA1e049c95ffd9cc3bb280c7228f008bb57bf174611
SHA25610494bde9ea115b619a294bf92806d15612392cc0a09482c7a1628d438af5572
SHA5125e96f4044706fb211cb013d475304aec13aeb34ed7160d48424b98aa600d3dae8a0ca6a2cea21cdcfc454461da694fc5678e90169e1e391b6c374d082361efe0