Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
cb55bf02958c9cefbb81aec9f50dedd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb55bf02958c9cefbb81aec9f50dedd9.exe
Resource
win10v2004-20240226-en
General
-
Target
cb55bf02958c9cefbb81aec9f50dedd9.exe
-
Size
14.9MB
-
MD5
cb55bf02958c9cefbb81aec9f50dedd9
-
SHA1
3ea1ea77967609654bd5e1481fd8659d2d77882b
-
SHA256
cdbcf96eb2e66544db4ee3a0319799623589e2fce14a1545eafaf302a4c05eec
-
SHA512
fe7c169bdcba12de3b11662b3397f4a0949935c036217e58ab5f6649acdffd887b1073e396fa8b798d75818315929e21333e83b8d73de12e108ac0e68e232659
-
SSDEEP
24576:5jY+lg48SlJPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP/:UHSl
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2496 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jfpraczx\ImagePath = "C:\\Windows\\SysWOW64\\jfpraczx\\gmxiapjv.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation cb55bf02958c9cefbb81aec9f50dedd9.exe -
Deletes itself 1 IoCs
pid Process 808 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 716 gmxiapjv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 716 set thread context of 808 716 gmxiapjv.exe 113 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4888 sc.exe 5076 sc.exe 1620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1588 4388 WerFault.exe 88 4528 716 WerFault.exe 106 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3628 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 92 PID 4388 wrote to memory of 3628 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 92 PID 4388 wrote to memory of 3628 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 92 PID 4388 wrote to memory of 1236 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 96 PID 4388 wrote to memory of 1236 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 96 PID 4388 wrote to memory of 1236 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 96 PID 4388 wrote to memory of 5076 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 98 PID 4388 wrote to memory of 5076 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 98 PID 4388 wrote to memory of 5076 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 98 PID 4388 wrote to memory of 1620 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 102 PID 4388 wrote to memory of 1620 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 102 PID 4388 wrote to memory of 1620 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 102 PID 4388 wrote to memory of 4888 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 104 PID 4388 wrote to memory of 4888 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 104 PID 4388 wrote to memory of 4888 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 104 PID 4388 wrote to memory of 2496 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 107 PID 4388 wrote to memory of 2496 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 107 PID 4388 wrote to memory of 2496 4388 cb55bf02958c9cefbb81aec9f50dedd9.exe 107 PID 716 wrote to memory of 808 716 gmxiapjv.exe 113 PID 716 wrote to memory of 808 716 gmxiapjv.exe 113 PID 716 wrote to memory of 808 716 gmxiapjv.exe 113 PID 716 wrote to memory of 808 716 gmxiapjv.exe 113 PID 716 wrote to memory of 808 716 gmxiapjv.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb55bf02958c9cefbb81aec9f50dedd9.exe"C:\Users\Admin\AppData\Local\Temp\cb55bf02958c9cefbb81aec9f50dedd9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jfpraczx\2⤵PID:3628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gmxiapjv.exe" C:\Windows\SysWOW64\jfpraczx\2⤵PID:1236
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jfpraczx binPath= "C:\Windows\SysWOW64\jfpraczx\gmxiapjv.exe /d\"C:\Users\Admin\AppData\Local\Temp\cb55bf02958c9cefbb81aec9f50dedd9.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:5076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jfpraczx "wifi internet conection"2⤵
- Launches sc.exe
PID:1620
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jfpraczx2⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 8002⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\jfpraczx\gmxiapjv.exeC:\Windows\SysWOW64\jfpraczx\gmxiapjv.exe /d"C:\Users\Admin\AppData\Local\Temp\cb55bf02958c9cefbb81aec9f50dedd9.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 5362⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 716 -ip 7161⤵PID:4712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD57b1ef8fd16e0a10e96902418093ba81d
SHA1af029d04661db371e98589ab862008478bc19267
SHA2563dd1db2cd991725b79504d6ba482648f18e4b0084725fb4a8f4349179f1d8836
SHA512f42d4cb6341ae625548b3b94878a9fc0d2244e4d84d3ef4e6588bb30bf5a35c089fb317967d3d8424af04d755e9611dc91605de2bda0a368465c530f3e928bf0
-
Filesize
14.0MB
MD502051de084f297a260dd0f3d803b68e4
SHA148c00b504349f1c08537f80c6010424c44842833
SHA25623c60a66c2de3fbb80fdbfa55879d32079e6b90750990185ab00b0444309916d
SHA512553f3b4d9ed541834238351488bddbad8888c8e30d3d42044cc5a97471a3e3dd93b61c4932f1115677e3660c860ae890c4e7948017062d8834190fd98f9e03a3