Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
8da541692d6b266d5917ed8c678b9cf6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8da541692d6b266d5917ed8c678b9cf6.exe
Resource
win10v2004-20231222-en
General
-
Target
8da541692d6b266d5917ed8c678b9cf6.exe
-
Size
11.7MB
-
MD5
8da541692d6b266d5917ed8c678b9cf6
-
SHA1
fe43e391f697fc87f12b9f5f10dd084d883b919c
-
SHA256
9c7030dfcb2bd5c4ef20d8b9280edf48189f3c0dd6dc08914a7e6a1c96690a35
-
SHA512
a1de4e825b86d2a11669a58bfebc08dce906ad75291405a4bb89b03359b20d73aaa5e083571f84a6e64a7373ec2a2a9b4abb828441a75ba1c1a86e3e2407f17a
-
SSDEEP
196608:5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\egehvvgs = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2736 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\egehvvgs\ImagePath = "C:\\Windows\\SysWOW64\\egehvvgs\\rapkwvcm.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2164 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 rapkwvcm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 2164 2660 rapkwvcm.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2664 sc.exe 2572 sc.exe 2752 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2676 2628 8da541692d6b266d5917ed8c678b9cf6.exe 28 PID 2628 wrote to memory of 2676 2628 8da541692d6b266d5917ed8c678b9cf6.exe 28 PID 2628 wrote to memory of 2676 2628 8da541692d6b266d5917ed8c678b9cf6.exe 28 PID 2628 wrote to memory of 2676 2628 8da541692d6b266d5917ed8c678b9cf6.exe 28 PID 2628 wrote to memory of 2804 2628 8da541692d6b266d5917ed8c678b9cf6.exe 30 PID 2628 wrote to memory of 2804 2628 8da541692d6b266d5917ed8c678b9cf6.exe 30 PID 2628 wrote to memory of 2804 2628 8da541692d6b266d5917ed8c678b9cf6.exe 30 PID 2628 wrote to memory of 2804 2628 8da541692d6b266d5917ed8c678b9cf6.exe 30 PID 2628 wrote to memory of 2752 2628 8da541692d6b266d5917ed8c678b9cf6.exe 32 PID 2628 wrote to memory of 2752 2628 8da541692d6b266d5917ed8c678b9cf6.exe 32 PID 2628 wrote to memory of 2752 2628 8da541692d6b266d5917ed8c678b9cf6.exe 32 PID 2628 wrote to memory of 2752 2628 8da541692d6b266d5917ed8c678b9cf6.exe 32 PID 2628 wrote to memory of 2664 2628 8da541692d6b266d5917ed8c678b9cf6.exe 34 PID 2628 wrote to memory of 2664 2628 8da541692d6b266d5917ed8c678b9cf6.exe 34 PID 2628 wrote to memory of 2664 2628 8da541692d6b266d5917ed8c678b9cf6.exe 34 PID 2628 wrote to memory of 2664 2628 8da541692d6b266d5917ed8c678b9cf6.exe 34 PID 2628 wrote to memory of 2572 2628 8da541692d6b266d5917ed8c678b9cf6.exe 36 PID 2628 wrote to memory of 2572 2628 8da541692d6b266d5917ed8c678b9cf6.exe 36 PID 2628 wrote to memory of 2572 2628 8da541692d6b266d5917ed8c678b9cf6.exe 36 PID 2628 wrote to memory of 2572 2628 8da541692d6b266d5917ed8c678b9cf6.exe 36 PID 2628 wrote to memory of 2736 2628 8da541692d6b266d5917ed8c678b9cf6.exe 39 PID 2628 wrote to memory of 2736 2628 8da541692d6b266d5917ed8c678b9cf6.exe 39 PID 2628 wrote to memory of 2736 2628 8da541692d6b266d5917ed8c678b9cf6.exe 39 PID 2628 wrote to memory of 2736 2628 8da541692d6b266d5917ed8c678b9cf6.exe 39 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41 PID 2660 wrote to memory of 2164 2660 rapkwvcm.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da541692d6b266d5917ed8c678b9cf6.exe"C:\Users\Admin\AppData\Local\Temp\8da541692d6b266d5917ed8c678b9cf6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\egehvvgs\2⤵PID:2676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rapkwvcm.exe" C:\Windows\SysWOW64\egehvvgs\2⤵PID:2804
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create egehvvgs binPath= "C:\Windows\SysWOW64\egehvvgs\rapkwvcm.exe /d\"C:\Users\Admin\AppData\Local\Temp\8da541692d6b266d5917ed8c678b9cf6.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2752
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description egehvvgs "wifi internet conection"2⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start egehvvgs2⤵
- Launches sc.exe
PID:2572
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2736
-
-
C:\Windows\SysWOW64\egehvvgs\rapkwvcm.exeC:\Windows\SysWOW64\egehvvgs\rapkwvcm.exe /d"C:\Users\Admin\AppData\Local\Temp\8da541692d6b266d5917ed8c678b9cf6.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD51b3200ae75927411903bc35aafd088b7
SHA14ee80c1704bfc1a2a7dde8f9ebdf5281c4c54c01
SHA25687d5b70d06390750ecfd34dd620d94d919eb922045ec51f2b33f27accf3659b8
SHA512d21d9b5fa9ba98f3c51443051023e7dffecca48b335fabf3e7b6cc2127ec399766673d0e2e19587221e8965fbb308f4da85ba62b7efb1068b069d411ae0e94d8
-
Filesize
11.1MB
MD5e076776e507b9c8122ae278aa7177aea
SHA115094b51c83e7ab2328f51d1ea5c6d261ad344c8
SHA25685fcad5bb2eb4c39efa3eb565a7d6cf7cd3b961056f6796c7b39c7a46b5b234e
SHA5122f5a08289c277a79756a8cea76e54fbb1dc61c9b4908957f5d21b522dd5188b3b2d4e8f5c1a23a5fd16ddbd9c3a5dd17d474fa90debd8c63e63cb4155706f756