Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 23:28
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
167KB
-
MD5
db37e2dceca24b2a30667e7a26816e5a
-
SHA1
a52d6f9718d4cb71f623f463cd590f76ad04878c
-
SHA256
997f091cec1b6b0ca4c760582289f88fc845072e15d22fb9ebbc70d8a411eb34
-
SHA512
b1f0795046296ce3ded9b195d40308999d3800f6886abff6730df2a047f30d3188828b48bd697069f51f038d8ff876d69e07563ef242070b30e219dce04b948c
-
SSDEEP
3072:MVtkj/2yjSgA2EVu5W+L/l5JYmsd//FuJpXxS5osnN:MnK+gA2EIL/lYZFupXI/
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3904 bhzotmd.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3980 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ubghzjgj\ImagePath = "C:\\Windows\\SysWOW64\\ubghzjgj\\bhzotmd.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3904 set thread context of 4604 3904 bhzotmd.exe 101 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4260 sc.exe 1764 sc.exe 3912 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4512 5052 file.exe 86 PID 5052 wrote to memory of 4512 5052 file.exe 86 PID 5052 wrote to memory of 4512 5052 file.exe 86 PID 5052 wrote to memory of 1412 5052 file.exe 88 PID 5052 wrote to memory of 1412 5052 file.exe 88 PID 5052 wrote to memory of 1412 5052 file.exe 88 PID 5052 wrote to memory of 1764 5052 file.exe 91 PID 5052 wrote to memory of 1764 5052 file.exe 91 PID 5052 wrote to memory of 1764 5052 file.exe 91 PID 5052 wrote to memory of 3912 5052 file.exe 92 PID 5052 wrote to memory of 3912 5052 file.exe 92 PID 5052 wrote to memory of 3912 5052 file.exe 92 PID 5052 wrote to memory of 4260 5052 file.exe 94 PID 5052 wrote to memory of 4260 5052 file.exe 94 PID 5052 wrote to memory of 4260 5052 file.exe 94 PID 5052 wrote to memory of 3980 5052 file.exe 98 PID 5052 wrote to memory of 3980 5052 file.exe 98 PID 5052 wrote to memory of 3980 5052 file.exe 98 PID 3904 wrote to memory of 4604 3904 bhzotmd.exe 101 PID 3904 wrote to memory of 4604 3904 bhzotmd.exe 101 PID 3904 wrote to memory of 4604 3904 bhzotmd.exe 101 PID 3904 wrote to memory of 4604 3904 bhzotmd.exe 101 PID 3904 wrote to memory of 4604 3904 bhzotmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ubghzjgj\2⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bhzotmd.exe" C:\Windows\SysWOW64\ubghzjgj\2⤵PID:1412
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ubghzjgj binPath= "C:\Windows\SysWOW64\ubghzjgj\bhzotmd.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ubghzjgj "wifi internet conection"2⤵
- Launches sc.exe
PID:3912
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ubghzjgj2⤵
- Launches sc.exe
PID:4260
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3980
-
-
C:\Windows\SysWOW64\ubghzjgj\bhzotmd.exeC:\Windows\SysWOW64\ubghzjgj\bhzotmd.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:4604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5c775be10a204cdfdbd1854c6231f547d
SHA1506710a1f4dd19d9f635351926ddb6d81059c596
SHA2569612e630417beba4cfd9e76b8685de422fabea6caf192494fa61cfaad53bc213
SHA5123153d295fb3e65c4b012043cfda38619f49ddb27dd96bec80cbefc59375d768a8f6864a9dc5ea7c557270ec0c7453a9532311951b4c567e7b7472cf73b7817ad
-
Filesize
13.0MB
MD5c775be10a204cdfdbd1854c6231f547d
SHA1506710a1f4dd19d9f635351926ddb6d81059c596
SHA2569612e630417beba4cfd9e76b8685de422fabea6caf192494fa61cfaad53bc213
SHA5123153d295fb3e65c4b012043cfda38619f49ddb27dd96bec80cbefc59375d768a8f6864a9dc5ea7c557270ec0c7453a9532311951b4c567e7b7472cf73b7817ad