Resubmissions
23-01-2023 11:03
230123-m5q8hada22 1023-01-2023 11:02
230123-m5gdasef3z 1010-05-2020 02:47
200510-dz18eg1lgs 10Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-01-2023 11:03
Static task
static1
Behavioral task
behavioral1
Sample
supvobl.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
supvobl.exe
Resource
win10v2004-20220812-en
General
-
Target
supvobl.exe
-
Size
12.5MB
-
MD5
be286c784044379ca9a6ca6e7211a29f
-
SHA1
bf8010a0e4b7ae88095bd9ee303707f4c0da549e
-
SHA256
d05cd710559cb6a23a84f44bfe88b91582862c7d70134cf71807ae0c49964993
-
SHA512
862e1beffa2cd58cd606a9edf2be79a03ca4a93f2edd6528e91eed2f68ad889e2e76dd43f164cd8f7eb02567504cbcf9581f730177f841a3e5a0298b48674b13
-
SSDEEP
24576:P7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hg:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ibvrcqqe = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
ojnfvgig.exepid process 1876 ojnfvgig.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ibvrcqqe\ImagePath = "C:\\Windows\\SysWOW64\\ibvrcqqe\\ojnfvgig.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 892 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ojnfvgig.exedescription pid process target process PID 1876 set thread context of 892 1876 ojnfvgig.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1068 sc.exe 1120 sc.exe 1756 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
supvobl.exeojnfvgig.exedescription pid process target process PID 1160 wrote to memory of 940 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 940 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 940 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 940 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 760 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 760 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 760 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 760 1160 supvobl.exe cmd.exe PID 1160 wrote to memory of 1068 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1068 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1068 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1068 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1120 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1120 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1120 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1120 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1756 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1756 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1756 1160 supvobl.exe sc.exe PID 1160 wrote to memory of 1756 1160 supvobl.exe sc.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1876 wrote to memory of 892 1876 ojnfvgig.exe svchost.exe PID 1160 wrote to memory of 552 1160 supvobl.exe netsh.exe PID 1160 wrote to memory of 552 1160 supvobl.exe netsh.exe PID 1160 wrote to memory of 552 1160 supvobl.exe netsh.exe PID 1160 wrote to memory of 552 1160 supvobl.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\supvobl.exe"C:\Users\Admin\AppData\Local\Temp\supvobl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ibvrcqqe\2⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ojnfvgig.exe" C:\Windows\SysWOW64\ibvrcqqe\2⤵PID:760
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ibvrcqqe binPath= "C:\Windows\SysWOW64\ibvrcqqe\ojnfvgig.exe /d\"C:\Users\Admin\AppData\Local\Temp\supvobl.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1068
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ibvrcqqe "wifi internet conection"2⤵
- Launches sc.exe
PID:1120
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ibvrcqqe2⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:552
-
-
C:\Windows\SysWOW64\ibvrcqqe\ojnfvgig.exeC:\Windows\SysWOW64\ibvrcqqe\ojnfvgig.exe /d"C:\Users\Admin\AppData\Local\Temp\supvobl.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.8MB
MD5de00e5b33e4b8feae7e444bdc21fff92
SHA12b1ff1fee0b67fde1e70bf9145291e8de24516b3
SHA256bd1977c4b8fbd857a0ea6f0ae7a31a0cb2eed2d3e7303ec36eb5077e92ba1186
SHA512d18d9f6700df5193bd9466f3635969d816c4b5182f096096de55f6c2ec4ed273e2ec795e56c10915410b4c72817ba2c8efcad0dbe47ccfed12d8d78d0b8d68e9
-
Filesize
12.8MB
MD5de00e5b33e4b8feae7e444bdc21fff92
SHA12b1ff1fee0b67fde1e70bf9145291e8de24516b3
SHA256bd1977c4b8fbd857a0ea6f0ae7a31a0cb2eed2d3e7303ec36eb5077e92ba1186
SHA512d18d9f6700df5193bd9466f3635969d816c4b5182f096096de55f6c2ec4ed273e2ec795e56c10915410b4c72817ba2c8efcad0dbe47ccfed12d8d78d0b8d68e9