Analysis
-
max time kernel
246s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 18:21
Static task
static1
Behavioral task
behavioral1
Sample
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe
Resource
win7-20221111-en
General
-
Target
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe
-
Size
148KB
-
MD5
53538af5c50d7630c126e6c2dff32c7b
-
SHA1
19d9fc9ad096addf16608b6f13ea24bd042c6c51
-
SHA256
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62
-
SHA512
4d234a9e726d6fb5822e5a31c00d63f0ac6aa0bad4c129c270d18fe7168a6760a030dc3c48305a88350756c4836b373a081070622cc32806af6b71c221c7db68
-
SSDEEP
3072:i2cTyeE8AeWn5ku22jifgRimvWkdpvbY:CTyx8Aej2jdzek/Y
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 916 sc.exe 1760 sc.exe 1324 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exedescription pid process target process PID 1712 wrote to memory of 1952 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1952 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1952 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1952 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1364 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1364 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1364 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 1364 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe cmd.exe PID 1712 wrote to memory of 916 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 916 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 916 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 916 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1760 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1760 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1760 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1760 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1324 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1324 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1324 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 1324 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe sc.exe PID 1712 wrote to memory of 524 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe netsh.exe PID 1712 wrote to memory of 524 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe netsh.exe PID 1712 wrote to memory of 524 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe netsh.exe PID 1712 wrote to memory of 524 1712 38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe"C:\Users\Admin\AppData\Local\Temp\38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\sckbcwrf\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qnhifndk.exe" C:\Windows\SysWOW64\sckbcwrf\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create sckbcwrf binPath= "C:\Windows\SysWOW64\sckbcwrf\qnhifndk.exe /d\"C:\Users\Admin\AppData\Local\Temp\38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description sckbcwrf "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start sckbcwrf2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\qnhifndk.exeFilesize
11.9MB
MD536fb48b61071923aa492971974af80b5
SHA1060d4e889f021ef84001a6de64a53a4567866089
SHA2565481b01d33687a228cc361c603d55387430be34466ee98792583a383707dd883
SHA512f5313365a5fb56e50ec711c0912f6ce0bc33951c763843585d91c6bc31b330788a649c887929b4df402e483afb117fe41202f7dc4dbbc9fd644e14820016a945
-
memory/524-67-0x0000000000000000-mapping.dmp
-
memory/916-63-0x0000000000000000-mapping.dmp
-
memory/1324-66-0x0000000000000000-mapping.dmp
-
memory/1364-61-0x0000000000000000-mapping.dmp
-
memory/1712-58-0x0000000000BBB000-0x0000000000BCC000-memory.dmpFilesize
68KB
-
memory/1712-59-0x0000000000220000-0x0000000000233000-memory.dmpFilesize
76KB
-
memory/1712-57-0x0000000000400000-0x0000000000AD7000-memory.dmpFilesize
6.8MB
-
memory/1712-56-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/1712-65-0x0000000000400000-0x0000000000AD7000-memory.dmpFilesize
6.8MB
-
memory/1712-54-0x0000000000BBB000-0x0000000000BCC000-memory.dmpFilesize
68KB
-
memory/1712-55-0x0000000000220000-0x0000000000233000-memory.dmpFilesize
76KB
-
memory/1712-68-0x0000000000BBB000-0x0000000000BCC000-memory.dmpFilesize
68KB
-
memory/1712-69-0x0000000000400000-0x0000000000AD7000-memory.dmpFilesize
6.8MB
-
memory/1760-64-0x0000000000000000-mapping.dmp
-
memory/1952-60-0x0000000000000000-mapping.dmp