Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe
Resource
win10v2004-20240508-en
General
-
Target
202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe
-
Size
14.2MB
-
MD5
8c3fa6fe70a4c5270a2b9c86d874d0cb
-
SHA1
c6ef5d44c3822e21c25e272eb9cd287485972ad0
-
SHA256
0d371a108223b043a6f04373b049548bbf1ea70acb13235bf38746f3b95e4743
-
SHA512
c2e3548eef8fef1b1f0b9ee77c9d91baa08ffca1def580f0eadd31b4b0793e60ea78004f381fe7e0d446603a754befad9b6ba730369043c73ae9589cb5a50251
-
SSDEEP
6144:/+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:/+r1IeSXMXc7LlxWV4Ug97GZ+ej
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2684 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\lnzvfalf\ImagePath = "C:\\Windows\\SysWOW64\\lnzvfalf\\pcqtvvtg.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3032 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
pcqtvvtg.exepid process 2672 pcqtvvtg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pcqtvvtg.exedescription pid process target process PID 2672 set thread context of 3032 2672 pcqtvvtg.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2664 sc.exe 2644 sc.exe 2320 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exepcqtvvtg.exedescription pid process target process PID 2024 wrote to memory of 1660 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1660 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1660 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1660 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1608 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1608 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1608 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 1608 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe cmd.exe PID 2024 wrote to memory of 2320 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2320 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2320 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2320 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2664 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2664 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2664 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2664 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2644 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2644 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2644 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2024 wrote to memory of 2644 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe sc.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2672 wrote to memory of 3032 2672 pcqtvvtg.exe svchost.exe PID 2024 wrote to memory of 2684 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe netsh.exe PID 2024 wrote to memory of 2684 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe netsh.exe PID 2024 wrote to memory of 2684 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe netsh.exe PID 2024 wrote to memory of 2684 2024 202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe"C:\Users\Admin\AppData\Local\Temp\202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lnzvfalf\2⤵PID:1660
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pcqtvvtg.exe" C:\Windows\SysWOW64\lnzvfalf\2⤵PID:1608
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lnzvfalf binPath= "C:\Windows\SysWOW64\lnzvfalf\pcqtvvtg.exe /d\"C:\Users\Admin\AppData\Local\Temp\202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2320 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lnzvfalf "wifi internet conection"2⤵
- Launches sc.exe
PID:2664 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lnzvfalf2⤵
- Launches sc.exe
PID:2644 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2684
-
C:\Windows\SysWOW64\lnzvfalf\pcqtvvtg.exeC:\Windows\SysWOW64\lnzvfalf\pcqtvvtg.exe /d"C:\Users\Admin\AppData\Local\Temp\202406158c3fa6fe70a4c5270a2b9c86d874d0cbmafia.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD53b0ab7bb31ff60dc65a1e1b3cc7803de
SHA18ce025673c2ca2501e23d1a5f61058ded109816e
SHA2568ee575d43876a8888e6fc21d508c115a5cdfaafd51413f88ce1ff2fb09f7ccb5
SHA5124e8849c6d0acb0d442f012a39cbf3e9b1a77c95e991772c2f1e8562c373ed686b8137f98e0f3312fa5698ce9b643ad7238234ac9ea831a99b5fd6b4e79b52935