Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-01-2023 11:03
Static task
static1
Behavioral task
behavioral1
Sample
supvobl.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
supvobl.exe
Resource
win10v2004-20220812-en
General
-
Target
supvobl.exe
-
Size
12.5MB
-
MD5
be286c784044379ca9a6ca6e7211a29f
-
SHA1
bf8010a0e4b7ae88095bd9ee303707f4c0da549e
-
SHA256
d05cd710559cb6a23a84f44bfe88b91582862c7d70134cf71807ae0c49964993
-
SHA512
862e1beffa2cd58cd606a9edf2be79a03ca4a93f2edd6528e91eed2f68ad889e2e76dd43f164cd8f7eb02567504cbcf9581f730177f841a3e5a0298b48674b13
-
SSDEEP
24576:P7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hE7hg:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ibifuntv = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
sbvasrmi.exepid process 284 sbvasrmi.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ibifuntv\ImagePath = "C:\\Windows\\SysWOW64\\ibifuntv\\sbvasrmi.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 684 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sbvasrmi.exedescription pid process target process PID 284 set thread context of 684 284 sbvasrmi.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 748 sc.exe 580 sc.exe 1480 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
supvobl.exesbvasrmi.exedescription pid process target process PID 1112 wrote to memory of 1004 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1004 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1004 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1004 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1672 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1672 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1672 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 1672 1112 supvobl.exe cmd.exe PID 1112 wrote to memory of 580 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 580 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 580 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 580 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 1480 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 1480 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 1480 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 1480 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 748 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 748 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 748 1112 supvobl.exe sc.exe PID 1112 wrote to memory of 748 1112 supvobl.exe sc.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 284 wrote to memory of 684 284 sbvasrmi.exe svchost.exe PID 1112 wrote to memory of 628 1112 supvobl.exe netsh.exe PID 1112 wrote to memory of 628 1112 supvobl.exe netsh.exe PID 1112 wrote to memory of 628 1112 supvobl.exe netsh.exe PID 1112 wrote to memory of 628 1112 supvobl.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\supvobl.exe"C:\Users\Admin\AppData\Local\Temp\supvobl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ibifuntv\2⤵PID:1004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sbvasrmi.exe" C:\Windows\SysWOW64\ibifuntv\2⤵PID:1672
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ibifuntv binPath= "C:\Windows\SysWOW64\ibifuntv\sbvasrmi.exe /d\"C:\Users\Admin\AppData\Local\Temp\supvobl.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:580
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ibifuntv "wifi internet conection"2⤵
- Launches sc.exe
PID:1480
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ibifuntv2⤵
- Launches sc.exe
PID:748
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:628
-
-
C:\Windows\SysWOW64\ibifuntv\sbvasrmi.exeC:\Windows\SysWOW64\ibifuntv\sbvasrmi.exe /d"C:\Users\Admin\AppData\Local\Temp\supvobl.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD5bfb67d5d3f100cd87a1c5a4f51eb3185
SHA14840ee2420dee2657bfb2a2fd91d7d3239429320
SHA25694dee3cd455cca6f4cbf06ae2826877a9423c1ace6e08b5c28b1a172645620de
SHA512cef1e73db6e24acc72baf3c3fb110916423a20d6596f30ed942f30bde1924311a6156404e03897fe17dc356c75d7c75a411b86e0e1809e69f80d660fce7ccf8b
-
Filesize
13.2MB
MD5bfb67d5d3f100cd87a1c5a4f51eb3185
SHA14840ee2420dee2657bfb2a2fd91d7d3239429320
SHA25694dee3cd455cca6f4cbf06ae2826877a9423c1ace6e08b5c28b1a172645620de
SHA512cef1e73db6e24acc72baf3c3fb110916423a20d6596f30ed942f30bde1924311a6156404e03897fe17dc356c75d7c75a411b86e0e1809e69f80d660fce7ccf8b