Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe
-
Size
12.2MB
-
MD5
d5163a500b24c2d07720cb4019dd3923
-
SHA1
fc869db383392a90e85191049766eeb046767c10
-
SHA256
0feb3db1f329e0a0a248026b03df0bc76f462d51d13ff1ddd0069d189c3cd7e8
-
SHA512
98288e9c075089c90931e65ae8818aa033e6b3957dd445778e991a0ab6b7abc1ac498fa308cb257878300ff406dc8818937c6a28c95283a3cea36087969a1c85
-
SSDEEP
6144:JqXbY+SAjhUEzmPy0jhM7o8cMp/sP9gdiw1fagj1x2Eqqqqqqqqqqqqqqqqqqqqv:JqLY+4oAfj2o8X/U9gdjj
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3024 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uhzfzaji\ImagePath = "C:\\Windows\\SysWOW64\\uhzfzaji\\bgttwvlq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3972 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
bgttwvlq.exepid process 1032 bgttwvlq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bgttwvlq.exedescription pid process target process PID 1032 set thread context of 3972 1032 bgttwvlq.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2872 sc.exe 216 sc.exe 1352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exebgttwvlq.exedescription pid process target process PID 1848 wrote to memory of 3816 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 3816 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 3816 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 2752 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 2752 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 2752 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe cmd.exe PID 1848 wrote to memory of 1352 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 1352 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 1352 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 2872 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 2872 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 2872 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 216 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 216 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 216 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe sc.exe PID 1848 wrote to memory of 3024 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe netsh.exe PID 1848 wrote to memory of 3024 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe netsh.exe PID 1848 wrote to memory of 3024 1848 2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe netsh.exe PID 1032 wrote to memory of 3972 1032 bgttwvlq.exe svchost.exe PID 1032 wrote to memory of 3972 1032 bgttwvlq.exe svchost.exe PID 1032 wrote to memory of 3972 1032 bgttwvlq.exe svchost.exe PID 1032 wrote to memory of 3972 1032 bgttwvlq.exe svchost.exe PID 1032 wrote to memory of 3972 1032 bgttwvlq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\uhzfzaji\2⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bgttwvlq.exe" C:\Windows\SysWOW64\uhzfzaji\2⤵PID:2752
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create uhzfzaji binPath= "C:\Windows\SysWOW64\uhzfzaji\bgttwvlq.exe /d\"C:\Users\Admin\AppData\Local\Temp\2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1352 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description uhzfzaji "wifi internet conection"2⤵
- Launches sc.exe
PID:2872 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start uhzfzaji2⤵
- Launches sc.exe
PID:216 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3024
-
C:\Windows\SysWOW64\uhzfzaji\bgttwvlq.exeC:\Windows\SysWOW64\uhzfzaji\bgttwvlq.exe /d"C:\Users\Admin\AppData\Local\Temp\2024-05-30_d5163a500b24c2d07720cb4019dd3923_mafia.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.6MB
MD5742092c77b19c47ed4067e25eba4ecea
SHA1792dd6c960ab0b77830fba534b03e28fd84c009d
SHA25609995251a277afcf646e8bf8a4ea89e2a4f811d181340381f6c5629d6fe7ebb7
SHA512107d6f6f8f785e15bece45d94d08393e7ff8fffdb189d2dd806e593c7b82c3f7793d635760921dc8aae87134e76b929b2720faf3695ca2669c1ce55a824c7b44