Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 15:50
Static task
static1
Behavioral task
behavioral1
Sample
b0ef9fcbeb328309d351e64c5a9d9b28.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b0ef9fcbeb328309d351e64c5a9d9b28.exe
Resource
win10v20201028
General
-
Target
b0ef9fcbeb328309d351e64c5a9d9b28.exe
-
Size
12.6MB
-
MD5
b0ef9fcbeb328309d351e64c5a9d9b28
-
SHA1
300fd154888d07410f05d93617af4ea2087ff7d3
-
SHA256
09519dcbbda00e527d6e23fa992978426938709819a7dd9cd9bd114ecdb915c9
-
SHA512
a10b85f67fc87e579420141436195d91288b58fa105552f5d8abe670248d583f7ec18999238662ea267b03dd2b38e322b41cac8344b498fa1556c903563fd2a6
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
wboorqgl.exepid process 820 wboorqgl.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 840 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wboorqgl.exedescription pid process target process PID 820 set thread context of 840 820 wboorqgl.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
b0ef9fcbeb328309d351e64c5a9d9b28.exewboorqgl.exedescription pid process target process PID 1204 wrote to memory of 1192 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1192 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1192 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1192 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1168 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1168 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1168 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1168 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe cmd.exe PID 1204 wrote to memory of 1260 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1260 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1260 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1260 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1624 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1624 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1624 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1624 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 400 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 400 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 400 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 400 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe sc.exe PID 1204 wrote to memory of 1016 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe netsh.exe PID 1204 wrote to memory of 1016 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe netsh.exe PID 1204 wrote to memory of 1016 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe netsh.exe PID 1204 wrote to memory of 1016 1204 b0ef9fcbeb328309d351e64c5a9d9b28.exe netsh.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe PID 820 wrote to memory of 840 820 wboorqgl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ef9fcbeb328309d351e64c5a9d9b28.exe"C:\Users\Admin\AppData\Local\Temp\b0ef9fcbeb328309d351e64c5a9d9b28.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hsrfpgdd\2⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wboorqgl.exe" C:\Windows\SysWOW64\hsrfpgdd\2⤵PID:1168
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hsrfpgdd binPath= "C:\Windows\SysWOW64\hsrfpgdd\wboorqgl.exe /d\"C:\Users\Admin\AppData\Local\Temp\b0ef9fcbeb328309d351e64c5a9d9b28.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1260
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hsrfpgdd "wifi internet conection"2⤵PID:1624
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hsrfpgdd2⤵PID:400
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1016
-
C:\Windows\SysWOW64\hsrfpgdd\wboorqgl.exeC:\Windows\SysWOW64\hsrfpgdd\wboorqgl.exe /d"C:\Users\Admin\AppData\Local\Temp\b0ef9fcbeb328309d351e64c5a9d9b28.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
PID:840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\wboorqgl.exeMD5
ae7fbe91467a7cc17ef45732bb8f2783
SHA1365bd28bf8adc33a5da9919f706fc726ceea3e4a
SHA256142b53017d10e973e097d483cda5f9b27e230d6f01ec4997599f56a9367c5041
SHA512896d04f796c716c25406bcc278c22d11bd436585c451d7e6e3ee56337e720a806c2aa4cfbd1406f11f28cd8b5892f7a3cef8e43e18f244869a7d309eb7d95524
-
C:\Windows\SysWOW64\hsrfpgdd\wboorqgl.exeMD5
ae7fbe91467a7cc17ef45732bb8f2783
SHA1365bd28bf8adc33a5da9919f706fc726ceea3e4a
SHA256142b53017d10e973e097d483cda5f9b27e230d6f01ec4997599f56a9367c5041
SHA512896d04f796c716c25406bcc278c22d11bd436585c451d7e6e3ee56337e720a806c2aa4cfbd1406f11f28cd8b5892f7a3cef8e43e18f244869a7d309eb7d95524
-
memory/400-7-0x0000000000000000-mapping.dmp
-
memory/840-10-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/840-11-0x0000000000089A6B-mapping.dmp
-
memory/1016-8-0x0000000000000000-mapping.dmp
-
memory/1168-3-0x0000000000000000-mapping.dmp
-
memory/1192-2-0x0000000000000000-mapping.dmp
-
memory/1260-5-0x0000000000000000-mapping.dmp
-
memory/1624-6-0x0000000000000000-mapping.dmp