Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
d5c42c0b4c034d6298c7565c450295a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5c42c0b4c034d6298c7565c450295a9.exe
Resource
win10v2004-20240226-en
General
-
Target
d5c42c0b4c034d6298c7565c450295a9.exe
-
Size
13.3MB
-
MD5
d5c42c0b4c034d6298c7565c450295a9
-
SHA1
62daa0659d317e740cc7c28f3d2737f71827939d
-
SHA256
10c0e1e2f3655cfcec5152956f55317f97f354eebeb6b92faadd32cf536ce3e7
-
SHA512
63e6f30d031afd20be58aac790a9b93ec062d566faebd71825264095b3443ea4af1db2b5744c296ac6cda81ec4f41d3ce41d512a64cfdb4bdda42c224414203b
-
SSDEEP
49152:Lj55555555555555555555555555555555555555555555555555555555555559:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 928 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\sadxlaig\ImagePath = "C:\\Windows\\SysWOW64\\sadxlaig\\fwpszmyx.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation d5c42c0b4c034d6298c7565c450295a9.exe -
Deletes itself 1 IoCs
pid Process 3020 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 fwpszmyx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4644 set thread context of 3020 4644 fwpszmyx.exe 102 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2408 sc.exe 3128 sc.exe 1104 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 436 wrote to memory of 3568 436 d5c42c0b4c034d6298c7565c450295a9.exe 91 PID 436 wrote to memory of 3568 436 d5c42c0b4c034d6298c7565c450295a9.exe 91 PID 436 wrote to memory of 3568 436 d5c42c0b4c034d6298c7565c450295a9.exe 91 PID 436 wrote to memory of 4916 436 d5c42c0b4c034d6298c7565c450295a9.exe 93 PID 436 wrote to memory of 4916 436 d5c42c0b4c034d6298c7565c450295a9.exe 93 PID 436 wrote to memory of 4916 436 d5c42c0b4c034d6298c7565c450295a9.exe 93 PID 436 wrote to memory of 2408 436 d5c42c0b4c034d6298c7565c450295a9.exe 95 PID 436 wrote to memory of 2408 436 d5c42c0b4c034d6298c7565c450295a9.exe 95 PID 436 wrote to memory of 2408 436 d5c42c0b4c034d6298c7565c450295a9.exe 95 PID 436 wrote to memory of 3128 436 d5c42c0b4c034d6298c7565c450295a9.exe 97 PID 436 wrote to memory of 3128 436 d5c42c0b4c034d6298c7565c450295a9.exe 97 PID 436 wrote to memory of 3128 436 d5c42c0b4c034d6298c7565c450295a9.exe 97 PID 436 wrote to memory of 1104 436 d5c42c0b4c034d6298c7565c450295a9.exe 99 PID 436 wrote to memory of 1104 436 d5c42c0b4c034d6298c7565c450295a9.exe 99 PID 436 wrote to memory of 1104 436 d5c42c0b4c034d6298c7565c450295a9.exe 99 PID 4644 wrote to memory of 3020 4644 fwpszmyx.exe 102 PID 4644 wrote to memory of 3020 4644 fwpszmyx.exe 102 PID 4644 wrote to memory of 3020 4644 fwpszmyx.exe 102 PID 4644 wrote to memory of 3020 4644 fwpszmyx.exe 102 PID 4644 wrote to memory of 3020 4644 fwpszmyx.exe 102 PID 436 wrote to memory of 928 436 d5c42c0b4c034d6298c7565c450295a9.exe 103 PID 436 wrote to memory of 928 436 d5c42c0b4c034d6298c7565c450295a9.exe 103 PID 436 wrote to memory of 928 436 d5c42c0b4c034d6298c7565c450295a9.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5c42c0b4c034d6298c7565c450295a9.exe"C:\Users\Admin\AppData\Local\Temp\d5c42c0b4c034d6298c7565c450295a9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\sadxlaig\2⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fwpszmyx.exe" C:\Windows\SysWOW64\sadxlaig\2⤵PID:4916
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create sadxlaig binPath= "C:\Windows\SysWOW64\sadxlaig\fwpszmyx.exe /d\"C:\Users\Admin\AppData\Local\Temp\d5c42c0b4c034d6298c7565c450295a9.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2408
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description sadxlaig "wifi internet conection"2⤵
- Launches sc.exe
PID:3128
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start sadxlaig2⤵
- Launches sc.exe
PID:1104
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:928
-
-
C:\Windows\SysWOW64\sadxlaig\fwpszmyx.exeC:\Windows\SysWOW64\sadxlaig\fwpszmyx.exe /d"C:\Users\Admin\AppData\Local\Temp\d5c42c0b4c034d6298c7565c450295a9.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5125bcd029aafe38af3b577015dd8bd04
SHA10f206b0e94b163723a1e03871a167d7b45438679
SHA2563787dbaf9275a9d5b5574992c0120672e945e4322977ed246fd50e2d9d99e66a
SHA512cfe8db6d7be9c1488ed212a995dc0c720e801952232db6c81a299c1bccd3e26a4982b251b64b73ce27432d1a79abfd0339c8969f550f26159cfca981dfcab9aa
-
Filesize
265KB
MD5a59a45cfad2d17324b25111447a3d499
SHA17565952ac3db3d01d15627180f1db74c2a4d6e44
SHA25635b326939ad068165a25d31af7deda434e603aa40f143282cf59c8b29442df8c
SHA51231c92c7036ea4a1563554c6308bea36238dd595bb760223f5f4d8c2fac1ce0287096e039d20566edb90369c904cbf0b1b10ccbdbf53b9597a2c52ef45f6a9ec7