Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
a2dac4450c8268e2c3ab41b28da9f6de.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2dac4450c8268e2c3ab41b28da9f6de.exe
Resource
win10v2004-20240221-en
General
-
Target
a2dac4450c8268e2c3ab41b28da9f6de.exe
-
Size
13.3MB
-
MD5
a2dac4450c8268e2c3ab41b28da9f6de
-
SHA1
4c112829564be4fd7208b5388b641a8ab68eefb7
-
SHA256
a6f0edcc4248c96cf33015626c80868eb1c9ed47198317c7add48ce23638c83f
-
SHA512
bc58ad5a68d7f3238bc59d775b28fc195859f3b42f20cf12dc8748d7f2e4e5d25d7080cc260990262f5d5760ecf51be5d9330c5a4bea7e886c33959bb6c33f82
-
SSDEEP
196608:5V8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY/:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3260 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\pfhgrfhe\ImagePath = "C:\\Windows\\SysWOW64\\pfhgrfhe\\rsuvpsnf.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation a2dac4450c8268e2c3ab41b28da9f6de.exe -
Deletes itself 1 IoCs
pid Process 4840 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 5104 rsuvpsnf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5104 set thread context of 4840 5104 rsuvpsnf.exe 105 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 228 sc.exe 2356 sc.exe 3536 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1644 1492 WerFault.exe 84 1140 5104 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 90 PID 1492 wrote to memory of 4536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 90 PID 1492 wrote to memory of 4536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 90 PID 1492 wrote to memory of 5040 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 92 PID 1492 wrote to memory of 5040 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 92 PID 1492 wrote to memory of 5040 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 92 PID 1492 wrote to memory of 2356 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 94 PID 1492 wrote to memory of 2356 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 94 PID 1492 wrote to memory of 2356 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 94 PID 1492 wrote to memory of 3536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 96 PID 1492 wrote to memory of 3536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 96 PID 1492 wrote to memory of 3536 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 96 PID 1492 wrote to memory of 228 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 99 PID 1492 wrote to memory of 228 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 99 PID 1492 wrote to memory of 228 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 99 PID 1492 wrote to memory of 3260 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 101 PID 1492 wrote to memory of 3260 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 101 PID 1492 wrote to memory of 3260 1492 a2dac4450c8268e2c3ab41b28da9f6de.exe 101 PID 5104 wrote to memory of 4840 5104 rsuvpsnf.exe 105 PID 5104 wrote to memory of 4840 5104 rsuvpsnf.exe 105 PID 5104 wrote to memory of 4840 5104 rsuvpsnf.exe 105 PID 5104 wrote to memory of 4840 5104 rsuvpsnf.exe 105 PID 5104 wrote to memory of 4840 5104 rsuvpsnf.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe"C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pfhgrfhe\2⤵PID:4536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rsuvpsnf.exe" C:\Windows\SysWOW64\pfhgrfhe\2⤵PID:5040
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pfhgrfhe binPath= "C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe /d\"C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2356
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pfhgrfhe "wifi internet conection"2⤵
- Launches sc.exe
PID:3536
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pfhgrfhe2⤵
- Launches sc.exe
PID:228
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 13042⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exeC:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe /d"C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 5122⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1492 -ip 14921⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5104 -ip 51041⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.4MB
MD567e7af8924e445327fd48714afad42a4
SHA14ba14d229cbbf3e4bcd1ac89620c51fdbe4d8ece
SHA2566c73c57dd9cd6a2fe374f2f7e8699c660f3b9d5917361f205a556a3d4f50415f
SHA512b923d7c9389d514ac47f6594677722aac5ca43126c10985db811d9d57ead0402308f47d39876e2d3d9ee1271deb42e129b7a6669a22b7dae6a61bee7d4d8832d
-
Filesize
12.5MB
MD5ad1ed314869dd490b15081075c6f3f82
SHA160f67f59028f4a166cb206f9bc77e2bc00386dba
SHA25684d893222a7dfc8b88c610d712c1e769df26ec8cdf6fe9c1d8afb868fe9ab9ea
SHA512070b8cae2e9b36947dbcfe95c4594282f1ed6c5261f5fb35f069e3393d28fee5b598d3887917a9d217ba0f925b55bd600e5815b47746a95cf8661e1b83aa48d5