Analysis
-
max time kernel
165s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
9ab434eaec334cd3c7ad3de7860f50e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ab434eaec334cd3c7ad3de7860f50e9.exe
Resource
win10v2004-20231215-en
General
-
Target
9ab434eaec334cd3c7ad3de7860f50e9.exe
-
Size
14.1MB
-
MD5
9ab434eaec334cd3c7ad3de7860f50e9
-
SHA1
ef2f800d35b1c03d831cadd0097bb0f902b52e2b
-
SHA256
630806b20660578f81ad037cbc49029aa8abd16251f56737b4d7f92ec9864858
-
SHA512
4fca6dde32468c4fa04ef22dd97550b62bfed8fb91982d722fb7385ebc380018f3e2428bf1f4c45a05e334b61a2890001e495e6623c1bb3059b50524a93aaab9
-
SSDEEP
49152:HQsPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:HQ
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3568 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\exitgfwx\ImagePath = "C:\\Windows\\SysWOW64\\exitgfwx\\hbdauqaf.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 9ab434eaec334cd3c7ad3de7860f50e9.exe -
Deletes itself 1 IoCs
pid Process 1432 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 hbdauqaf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 1432 1564 hbdauqaf.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 892 sc.exe 1524 sc.exe 2156 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4444 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 89 PID 3104 wrote to memory of 4444 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 89 PID 3104 wrote to memory of 4444 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 89 PID 3104 wrote to memory of 2388 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 91 PID 3104 wrote to memory of 2388 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 91 PID 3104 wrote to memory of 2388 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 91 PID 3104 wrote to memory of 892 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 93 PID 3104 wrote to memory of 892 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 93 PID 3104 wrote to memory of 892 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 93 PID 3104 wrote to memory of 1524 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 95 PID 3104 wrote to memory of 1524 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 95 PID 3104 wrote to memory of 1524 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 95 PID 3104 wrote to memory of 2156 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 97 PID 3104 wrote to memory of 2156 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 97 PID 3104 wrote to memory of 2156 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 97 PID 3104 wrote to memory of 3568 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 99 PID 3104 wrote to memory of 3568 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 99 PID 3104 wrote to memory of 3568 3104 9ab434eaec334cd3c7ad3de7860f50e9.exe 99 PID 1564 wrote to memory of 1432 1564 hbdauqaf.exe 103 PID 1564 wrote to memory of 1432 1564 hbdauqaf.exe 103 PID 1564 wrote to memory of 1432 1564 hbdauqaf.exe 103 PID 1564 wrote to memory of 1432 1564 hbdauqaf.exe 103 PID 1564 wrote to memory of 1432 1564 hbdauqaf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ab434eaec334cd3c7ad3de7860f50e9.exe"C:\Users\Admin\AppData\Local\Temp\9ab434eaec334cd3c7ad3de7860f50e9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\exitgfwx\2⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hbdauqaf.exe" C:\Windows\SysWOW64\exitgfwx\2⤵PID:2388
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create exitgfwx binPath= "C:\Windows\SysWOW64\exitgfwx\hbdauqaf.exe /d\"C:\Users\Admin\AppData\Local\Temp\9ab434eaec334cd3c7ad3de7860f50e9.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:892
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description exitgfwx "wifi internet conection"2⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start exitgfwx2⤵
- Launches sc.exe
PID:2156
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3568
-
-
C:\Windows\SysWOW64\exitgfwx\hbdauqaf.exeC:\Windows\SysWOW64\exitgfwx\hbdauqaf.exe /d"C:\Users\Admin\AppData\Local\Temp\9ab434eaec334cd3c7ad3de7860f50e9.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.4MB
MD555f0eb52e70eb96340654b6a8680cc37
SHA19c09297e94728277878b670d0c77c3a4de67c197
SHA256e366cd080c25f2dd15ea48f5f1480f00dab510b6c557dbaf27a6ef6aac482a73
SHA51245fe658cf19b4f01575ba87ce004a3211164e3dd144fe16b1c0e0c1422cb46bb807781cc63ea2e07bfd4e0a0a3e39909ce99a5f15ca1dc7ff326535d1b486019
-
Filesize
1.6MB
MD5951daa3d439025343fd4d218471d9333
SHA17337c86bd6b21fbef51ebc79997bab56618ea757
SHA2561bbbfc2a134955af13f31a0ae0f464c6e3ca33d8620019c6189a9a803b7e5b18
SHA512ea3ea7ce7113895c3b1386a4a4b1d22a1bc8975c34e1995cecb810744a86523ac172db2f166c266000759d3b9ca83dd162743c8c9f574338e70cc1becb386e72