Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe
Resource
win10v2004-20221111-en
General
-
Target
da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe
-
Size
185KB
-
MD5
491f10bcc9d547a9816a6e3147368a5f
-
SHA1
f36a1451152c3be82e38efbc6dfdb71ec7f0942f
-
SHA256
da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f
-
SHA512
566705814c5cb0631e5d3556a8380c317099f66d76a1ef4fccbe3712994314df453c41e8ad7b1fff2b8b1063c3f87d73853231a930f44fe0102cea8b44c83961
-
SSDEEP
3072:2Fg4HIK9Pilrss8ix9RJaMi4jrW/fTVUWNm+GIAsVBylcku:2F3rRjs5x9Rdji/fTVvPNVIl
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1020 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nmbdivia\ImagePath = "C:\\Windows\\SysWOW64\\nmbdivia\\licdaiyf.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe -
Executes dropped EXE 1 IoCs
pid Process 3112 licdaiyf.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3112 set thread context of 1540 3112 licdaiyf.exe 97 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 100 sc.exe 1408 sc.exe 2444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3996 3768 WerFault.exe 79 3492 3112 WerFault.exe 95 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1528 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 82 PID 3768 wrote to memory of 1528 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 82 PID 3768 wrote to memory of 1528 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 82 PID 3768 wrote to memory of 3172 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 84 PID 3768 wrote to memory of 3172 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 84 PID 3768 wrote to memory of 3172 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 84 PID 3768 wrote to memory of 100 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 86 PID 3768 wrote to memory of 100 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 86 PID 3768 wrote to memory of 100 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 86 PID 3768 wrote to memory of 1408 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 88 PID 3768 wrote to memory of 1408 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 88 PID 3768 wrote to memory of 1408 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 88 PID 3768 wrote to memory of 2444 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 90 PID 3768 wrote to memory of 2444 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 90 PID 3768 wrote to memory of 2444 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 90 PID 3768 wrote to memory of 1020 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 92 PID 3768 wrote to memory of 1020 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 92 PID 3768 wrote to memory of 1020 3768 da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe 92 PID 3112 wrote to memory of 1540 3112 licdaiyf.exe 97 PID 3112 wrote to memory of 1540 3112 licdaiyf.exe 97 PID 3112 wrote to memory of 1540 3112 licdaiyf.exe 97 PID 3112 wrote to memory of 1540 3112 licdaiyf.exe 97 PID 3112 wrote to memory of 1540 3112 licdaiyf.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe"C:\Users\Admin\AppData\Local\Temp\da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nmbdivia\2⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\licdaiyf.exe" C:\Windows\SysWOW64\nmbdivia\2⤵PID:3172
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nmbdivia binPath= "C:\Windows\SysWOW64\nmbdivia\licdaiyf.exe /d\"C:\Users\Admin\AppData\Local\Temp\da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:100
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nmbdivia "wifi internet conection"2⤵
- Launches sc.exe
PID:1408
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nmbdivia2⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 12082⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3768 -ip 37681⤵PID:2812
-
C:\Windows\SysWOW64\nmbdivia\licdaiyf.exeC:\Windows\SysWOW64\nmbdivia\licdaiyf.exe /d"C:\Users\Admin\AppData\Local\Temp\da9e1000fee01c6781ed0a7e5202d1445e734ae5ac39fbb3af2d0a272451731f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 5602⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3112 -ip 31121⤵PID:3076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD5b61a4a32b14729da4cd8fa1bc5250246
SHA1d2caef2bfa92e7a78c63bdf877ea58acb5409b98
SHA2567da6ccde241a4bc410ebed1cc2b687e956975a16067c05945ea8ffa683ccb489
SHA5125f65d6daf1fa5fd65a1e19ce6de9b0f8492da06286f50e3cc71a4da7ce12aea87bafb20fc54791b5e364622f0113cbd1d6b8c32077e9e925e76bc0c686745133
-
Filesize
13.3MB
MD5b61a4a32b14729da4cd8fa1bc5250246
SHA1d2caef2bfa92e7a78c63bdf877ea58acb5409b98
SHA2567da6ccde241a4bc410ebed1cc2b687e956975a16067c05945ea8ffa683ccb489
SHA5125f65d6daf1fa5fd65a1e19ce6de9b0f8492da06286f50e3cc71a4da7ce12aea87bafb20fc54791b5e364622f0113cbd1d6b8c32077e9e925e76bc0c686745133