Analysis

  • max time kernel
    3s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 17:36

General

  • Target

    2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe

  • Size

    12.7MB

  • MD5

    d843097807b69f23d9e9b92c78a6aef6

  • SHA1

    b169759391428e792bf917b88eac0d08a96a2e0d

  • SHA256

    71c8fa2e70bca29e60ee2f1dfcf36248aee5b23025b4aec2ecb20e5954a434d7

  • SHA512

    76fd4d1f5fb81d17e25ae675b29c5f947ab87c6a26250e29ec07bb821ea0310b7ed1d98d90e56da95968aef0fb821aa9632391d1d33ba05c1823331eaa8d0674

  • SSDEEP

    3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:1OMdRQr7OB0ypmMXnl8XEPM3noSWOC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3724
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wiklzxek\
      2⤵
        PID:3520
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xfuyljss.exe" C:\Windows\SysWOW64\wiklzxek\
        2⤵
          PID:4464
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create wiklzxek binPath= "C:\Windows\SysWOW64\wiklzxek\xfuyljss.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:4776
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description wiklzxek "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4580
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start wiklzxek
          2⤵
          • Launches sc.exe
          PID:4160
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:4192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 1040
          2⤵
          • Program crash
          PID:3188
      • C:\Windows\SysWOW64\wiklzxek\xfuyljss.exe
        C:\Windows\SysWOW64\wiklzxek\xfuyljss.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe"
        1⤵
          PID:2116
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            2⤵
              PID:5044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 508
              2⤵
              • Program crash
              PID:4024
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3724 -ip 3724
            1⤵
              PID:4256
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2116 -ip 2116
              1⤵
                PID:2404

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\xfuyljss.exe

                Filesize

                707KB

                MD5

                b2013aa86c08c8bca1667cf56046dd69

                SHA1

                fbefa8eb75caabc66e061b75f18a6e66f7ffb45b

                SHA256

                9059e00da0dba4bef89575a1b2f58a63ebabd387a218ac646896d1c503a7e62e

                SHA512

                ef2c6d81408b75ea47fbc447e97cda4f7c346d1012bd552521ef13665efca3acb8963a151e988253ddf76a9dc4eeb5077af677862d3e075fc6ce101ea251cd3d

              • C:\Windows\SysWOW64\wiklzxek\xfuyljss.exe

                Filesize

                682KB

                MD5

                87f7ba8eceedd6109a254cbbb194d9cc

                SHA1

                fccf7d9b7cd6751a6ab401f5b5f5768ee8cde9fe

                SHA256

                7c0b9ac8ac926e526616af6e735cabc89a4b611be13554f9d1028bafb5261405

                SHA512

                75e359de68e263d5d61b50284244ce4639869395cb062f63ba7a98f06406fda7baf39a8861ab139b4b705bcfc31e9588be9c24257c4cc62ddf7a803663e785a7

              • memory/2116-18-0x0000000000400000-0x000000000044E000-memory.dmp

                Filesize

                312KB

              • memory/2116-13-0x0000000000400000-0x000000000044E000-memory.dmp

                Filesize

                312KB

              • memory/2116-12-0x0000000000400000-0x000000000044E000-memory.dmp

                Filesize

                312KB

              • memory/2116-11-0x0000000000400000-0x000000000044E000-memory.dmp

                Filesize

                312KB

              • memory/3724-2-0x0000000000490000-0x00000000004A3000-memory.dmp

                Filesize

                76KB

              • memory/3724-3-0x0000000000400000-0x0000000000415000-memory.dmp

                Filesize

                84KB

              • memory/3724-7-0x0000000000400000-0x000000000044E000-memory.dmp

                Filesize

                312KB

              • memory/3724-9-0x0000000000400000-0x0000000000415000-memory.dmp

                Filesize

                84KB

              • memory/3724-8-0x0000000000490000-0x00000000004A3000-memory.dmp

                Filesize

                76KB

              • memory/3724-1-0x0000000000550000-0x0000000000650000-memory.dmp

                Filesize

                1024KB

              • memory/5044-17-0x00000000012D0000-0x00000000012E5000-memory.dmp

                Filesize

                84KB

              • memory/5044-16-0x00000000012D0000-0x00000000012E5000-memory.dmp

                Filesize

                84KB

              • memory/5044-14-0x00000000012D0000-0x00000000012E5000-memory.dmp

                Filesize

                84KB