Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:41
Behavioral task
behavioral1
Sample
e2f0b0cdbf6a708485ba8eec9b077310N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e2f0b0cdbf6a708485ba8eec9b077310N.exe
Resource
win10v2004-20240802-en
General
-
Target
e2f0b0cdbf6a708485ba8eec9b077310N.exe
-
Size
72KB
-
MD5
e2f0b0cdbf6a708485ba8eec9b077310
-
SHA1
a7cac54cf95a2f2fe29da0133a28a33c1cc9916a
-
SHA256
b744be865b905f904a65c905d5d98dfa695052dd24046deb6f929ebe23f65e94
-
SHA512
6a479af02a021b45b256bb901527b8ce108c2297f1d9939566cd9da7ce27fe67ba2c161dc9dc6cbad6a3fc097735438ccc72d1e7607d0bfde3a691f30cd1849c
-
SSDEEP
1536:TQzRMNmVCzUgZTOSnoFLSlR2DZVIsogQ4dytA11rpIl:MWmVCzUgVOuoglsbngAbrpI
Malware Config
Extracted
tofsee
103.248.137.133
59.188.74.26
115.230.124.76
111.121.193.242
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\lpabtwuz = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2784 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\lpabtwuz\ImagePath = "C:\\Windows\\SysWOW64\\lpabtwuz\\zrokirxt.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2508 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 960 zrokirxt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 2508 960 zrokirxt.exe 40 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2252 sc.exe 2792 sc.exe 2656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2f0b0cdbf6a708485ba8eec9b077310N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zrokirxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2344 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 29 PID 1820 wrote to memory of 2344 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 29 PID 1820 wrote to memory of 2344 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 29 PID 1820 wrote to memory of 2344 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 29 PID 1820 wrote to memory of 2060 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 31 PID 1820 wrote to memory of 2060 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 31 PID 1820 wrote to memory of 2060 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 31 PID 1820 wrote to memory of 2060 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 31 PID 1820 wrote to memory of 2252 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 33 PID 1820 wrote to memory of 2252 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 33 PID 1820 wrote to memory of 2252 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 33 PID 1820 wrote to memory of 2252 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 33 PID 1820 wrote to memory of 2792 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 35 PID 1820 wrote to memory of 2792 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 35 PID 1820 wrote to memory of 2792 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 35 PID 1820 wrote to memory of 2792 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 35 PID 1820 wrote to memory of 2656 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 37 PID 1820 wrote to memory of 2656 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 37 PID 1820 wrote to memory of 2656 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 37 PID 1820 wrote to memory of 2656 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 37 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 960 wrote to memory of 2508 960 zrokirxt.exe 40 PID 1820 wrote to memory of 2784 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 41 PID 1820 wrote to memory of 2784 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 41 PID 1820 wrote to memory of 2784 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 41 PID 1820 wrote to memory of 2784 1820 e2f0b0cdbf6a708485ba8eec9b077310N.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2f0b0cdbf6a708485ba8eec9b077310N.exe"C:\Users\Admin\AppData\Local\Temp\e2f0b0cdbf6a708485ba8eec9b077310N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lpabtwuz\2⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zrokirxt.exe" C:\Windows\SysWOW64\lpabtwuz\2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lpabtwuz binPath= "C:\Windows\SysWOW64\lpabtwuz\zrokirxt.exe /d\"C:\Users\Admin\AppData\Local\Temp\e2f0b0cdbf6a708485ba8eec9b077310N.exe\"" type= own start= auto DisplayName= "P2P Support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lpabtwuz "Internet Mobile Support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lpabtwuz2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\lpabtwuz\zrokirxt.exeC:\Windows\SysWOW64\lpabtwuz\zrokirxt.exe /d"C:\Users\Admin\AppData\Local\Temp\e2f0b0cdbf6a708485ba8eec9b077310N.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD5702b29c293318f73e21798839725b559
SHA19d85df36b96fa77caefcd69cf2949b952eddcec9
SHA256740a71e167794add78e09e7f7271293f234c9570136351a0bd7125157a42249b
SHA5126932657aad175c94415f384c321f5fa808360f539df394cf420b91de6896d6219f96c8f72ec9739af5ad383b8131f4e6367d71c4eaf7b42845b9c301b825ec05