Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
97f029181740b467acc797ec6eb2be3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97f029181740b467acc797ec6eb2be3b.exe
Resource
win10v2004-20231215-en
General
-
Target
97f029181740b467acc797ec6eb2be3b.exe
-
Size
14.1MB
-
MD5
97f029181740b467acc797ec6eb2be3b
-
SHA1
6221b864f9ce0954a623d8a5a8329787b5e33e97
-
SHA256
871f464151aa1ce0e53ea6ecad18bf3c45745d3279f9cd850557f064677daa80
-
SHA512
6822e5a2973a3ae1a950a3b863ea93f8c96de24b7b75d5b5ed3850396e0c9430d2515f514d83a9a156f9f0de239f74dc472ce3c06a65f64f6426d9cf86779713
-
SSDEEP
12288:hRXQK44fy6111111111111111111111111111111111111111111111111111111:hRx2
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\dkiiuxja = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2928 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\dkiiuxja\ImagePath = "C:\\Windows\\SysWOW64\\dkiiuxja\\fkupjvsu.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2636 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 fkupjvsu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2636 2868 fkupjvsu.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1952 sc.exe 2684 sc.exe 2960 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2020 2060 97f029181740b467acc797ec6eb2be3b.exe 28 PID 2060 wrote to memory of 2020 2060 97f029181740b467acc797ec6eb2be3b.exe 28 PID 2060 wrote to memory of 2020 2060 97f029181740b467acc797ec6eb2be3b.exe 28 PID 2060 wrote to memory of 2020 2060 97f029181740b467acc797ec6eb2be3b.exe 28 PID 2060 wrote to memory of 2328 2060 97f029181740b467acc797ec6eb2be3b.exe 30 PID 2060 wrote to memory of 2328 2060 97f029181740b467acc797ec6eb2be3b.exe 30 PID 2060 wrote to memory of 2328 2060 97f029181740b467acc797ec6eb2be3b.exe 30 PID 2060 wrote to memory of 2328 2060 97f029181740b467acc797ec6eb2be3b.exe 30 PID 2060 wrote to memory of 1952 2060 97f029181740b467acc797ec6eb2be3b.exe 32 PID 2060 wrote to memory of 1952 2060 97f029181740b467acc797ec6eb2be3b.exe 32 PID 2060 wrote to memory of 1952 2060 97f029181740b467acc797ec6eb2be3b.exe 32 PID 2060 wrote to memory of 1952 2060 97f029181740b467acc797ec6eb2be3b.exe 32 PID 2060 wrote to memory of 2684 2060 97f029181740b467acc797ec6eb2be3b.exe 34 PID 2060 wrote to memory of 2684 2060 97f029181740b467acc797ec6eb2be3b.exe 34 PID 2060 wrote to memory of 2684 2060 97f029181740b467acc797ec6eb2be3b.exe 34 PID 2060 wrote to memory of 2684 2060 97f029181740b467acc797ec6eb2be3b.exe 34 PID 2060 wrote to memory of 2960 2060 97f029181740b467acc797ec6eb2be3b.exe 36 PID 2060 wrote to memory of 2960 2060 97f029181740b467acc797ec6eb2be3b.exe 36 PID 2060 wrote to memory of 2960 2060 97f029181740b467acc797ec6eb2be3b.exe 36 PID 2060 wrote to memory of 2960 2060 97f029181740b467acc797ec6eb2be3b.exe 36 PID 2060 wrote to memory of 2928 2060 97f029181740b467acc797ec6eb2be3b.exe 39 PID 2060 wrote to memory of 2928 2060 97f029181740b467acc797ec6eb2be3b.exe 39 PID 2060 wrote to memory of 2928 2060 97f029181740b467acc797ec6eb2be3b.exe 39 PID 2060 wrote to memory of 2928 2060 97f029181740b467acc797ec6eb2be3b.exe 39 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41 PID 2868 wrote to memory of 2636 2868 fkupjvsu.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\97f029181740b467acc797ec6eb2be3b.exe"C:\Users\Admin\AppData\Local\Temp\97f029181740b467acc797ec6eb2be3b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dkiiuxja\2⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fkupjvsu.exe" C:\Windows\SysWOW64\dkiiuxja\2⤵PID:2328
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dkiiuxja binPath= "C:\Windows\SysWOW64\dkiiuxja\fkupjvsu.exe /d\"C:\Users\Admin\AppData\Local\Temp\97f029181740b467acc797ec6eb2be3b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dkiiuxja "wifi internet conection"2⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dkiiuxja2⤵
- Launches sc.exe
PID:2960
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2928
-
-
C:\Windows\SysWOW64\dkiiuxja\fkupjvsu.exeC:\Windows\SysWOW64\dkiiuxja\fkupjvsu.exe /d"C:\Users\Admin\AppData\Local\Temp\97f029181740b467acc797ec6eb2be3b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD5699c660889b57dc806149119e3edb014
SHA14ffc4dc2ef04d0ba1bb0eb69771607d8e0650b49
SHA2564b12912b3324d194ea69100e237a35ffe2f8630e6586b4fcd9a0b1ee187f62e5
SHA51283ba4ad9bb9698c37fd66b8d4e7c9829553e21d18458cd0b03ca3969f022fe4d9b84d0675f0e216987b8709e7308bcdbeef7de3dbf508442086dc2eb43c5ec5a