Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe
-
Size
12.2MB
-
MD5
8a464a50bc9eb0ccbcae6b9268bb6c30
-
SHA1
56971bd6026dc018efd0e32e44a4731b0b1c906f
-
SHA256
95829a10f0e9545aad05bdc05e8cc23a78789aec86a2e280e343721fd9ad0014
-
SHA512
5b3b034abd6d5304ffe774fac5a2255b4f57d926b197c9d0c2d07656db2bfc160e17b3b4d764a069eea6b06e343d003b032364f22f7749ee7061b1a05b29449a
-
SSDEEP
6144:X+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:X+r1IeSXMXc7LlxWV4Ug97GZ+ej
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\tzgtshdh = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1744 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\tzgtshdh\ImagePath = "C:\\Windows\\SysWOW64\\tzgtshdh\\sefzuqro.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2516 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
sefzuqro.exepid process 2540 sefzuqro.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sefzuqro.exedescription pid process target process PID 2540 set thread context of 2516 2540 sefzuqro.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2636 sc.exe 2728 sc.exe 2816 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exesefzuqro.exedescription pid process target process PID 2852 wrote to memory of 1904 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 1904 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 1904 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 1904 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 2624 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 2624 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 2624 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 2624 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe cmd.exe PID 2852 wrote to memory of 2728 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2728 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2728 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2728 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2636 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2636 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2636 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2636 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2816 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2816 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2816 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 2816 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe sc.exe PID 2852 wrote to memory of 1744 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe netsh.exe PID 2852 wrote to memory of 1744 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe netsh.exe PID 2852 wrote to memory of 1744 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe netsh.exe PID 2852 wrote to memory of 1744 2852 2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe netsh.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe PID 2540 wrote to memory of 2516 2540 sefzuqro.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tzgtshdh\2⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sefzuqro.exe" C:\Windows\SysWOW64\tzgtshdh\2⤵PID:2624
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tzgtshdh binPath= "C:\Windows\SysWOW64\tzgtshdh\sefzuqro.exe /d\"C:\Users\Admin\AppData\Local\Temp\2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2728 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tzgtshdh "wifi internet conection"2⤵
- Launches sc.exe
PID:2636 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tzgtshdh2⤵
- Launches sc.exe
PID:2816 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1744
-
C:\Windows\SysWOW64\tzgtshdh\sefzuqro.exeC:\Windows\SysWOW64\tzgtshdh\sefzuqro.exe /d"C:\Users\Admin\AppData\Local\Temp\2024-06-21_8a464a50bc9eb0ccbcae6b9268bb6c30_mafia.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD56b4f89e396f8b7ca3d12267304df10c3
SHA1f0b7e105d0afad698d00ce3eb25b1a77e51b0b05
SHA2563ddf7f8a4a297397345dabbccca33fe95f043610b152f7d6662d94618470c082
SHA512304bd478712f1911cb15d95ba3c0d9a250f33125da13e8d093cde5794a4826d1c2de7c4aa140db9ee067aff6c1974da5c16d0d7b79725ed393ed6765b994b182