Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 01:24
Static task
static1
Behavioral task
behavioral1
Sample
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe
Resource
win10v2004-20230221-en
General
-
Target
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe
-
Size
201KB
-
MD5
98f17302b4e156486845c83ad422c6aa
-
SHA1
83ffb44c4843b0ca414450644623897b1ffaed09
-
SHA256
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1
-
SHA512
660e78e8419e16d74b2f7a527608f14a071e2d69f8b260090ce943b3d05d6113ec67e7a698bdea17ee0431a68ce9830d28398813cb520cacd8f77950d61582a5
-
SSDEEP
3072:HiGTXJoDM4OArNhCqW53oPP/zRsMPVFuZmj8peC5OC7h6Bu4e:CU6o4OGNYoPP7zVF4mj8S0
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ejnntzha\ImagePath = "C:\\Windows\\SysWOW64\\ejnntzha\\xedqyygk.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe -
Executes dropped EXE 1 IoCs
Processes:
xedqyygk.exepid process 1836 xedqyygk.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xedqyygk.exedescription pid process target process PID 1836 set thread context of 1992 1836 xedqyygk.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 5056 sc.exe 4504 sc.exe 3864 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 216 1344 WerFault.exe 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe 1848 1836 WerFault.exe xedqyygk.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exexedqyygk.exedescription pid process target process PID 1344 wrote to memory of 2156 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 2156 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 2156 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 4856 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 4856 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 4856 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe cmd.exe PID 1344 wrote to memory of 5056 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 5056 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 5056 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 4504 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 4504 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 4504 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 3864 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 3864 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 3864 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe sc.exe PID 1344 wrote to memory of 1552 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe netsh.exe PID 1344 wrote to memory of 1552 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe netsh.exe PID 1344 wrote to memory of 1552 1344 36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe netsh.exe PID 1836 wrote to memory of 1992 1836 xedqyygk.exe svchost.exe PID 1836 wrote to memory of 1992 1836 xedqyygk.exe svchost.exe PID 1836 wrote to memory of 1992 1836 xedqyygk.exe svchost.exe PID 1836 wrote to memory of 1992 1836 xedqyygk.exe svchost.exe PID 1836 wrote to memory of 1992 1836 xedqyygk.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe"C:\Users\Admin\AppData\Local\Temp\36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ejnntzha\2⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xedqyygk.exe" C:\Windows\SysWOW64\ejnntzha\2⤵PID:4856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ejnntzha binPath= "C:\Windows\SysWOW64\ejnntzha\xedqyygk.exe /d\"C:\Users\Admin\AppData\Local\Temp\36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:5056
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ejnntzha "wifi internet conection"2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ejnntzha2⤵
- Launches sc.exe
PID:3864
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 10442⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1344 -ip 13441⤵PID:4648
-
C:\Windows\SysWOW64\ejnntzha\xedqyygk.exeC:\Windows\SysWOW64\ejnntzha\xedqyygk.exe /d"C:\Users\Admin\AppData\Local\Temp\36949fde2e1880e8c86de360f71c2302c67cd453840ffd43fc1288234f3c6aa1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 5082⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1836 -ip 18361⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD588f53cdcc5ef1c7731f0ff34cc150b2f
SHA1030c30af0bc0347babffb59b12bd9723e301a3d4
SHA256663b21fe1dc1ea7e3500bac1783d5890df61c910d55eeb93a52b1529fb140867
SHA512f1100e570e88258cc60e355143bda13ac6533c92ba7ad009ae27208404b7b3d0ef023fd281856ce5626708f77d50ee58f44bc8fce4985531f858048e2aeee9d0
-
Filesize
11.3MB
MD588f53cdcc5ef1c7731f0ff34cc150b2f
SHA1030c30af0bc0347babffb59b12bd9723e301a3d4
SHA256663b21fe1dc1ea7e3500bac1783d5890df61c910d55eeb93a52b1529fb140867
SHA512f1100e570e88258cc60e355143bda13ac6533c92ba7ad009ae27208404b7b3d0ef023fd281856ce5626708f77d50ee58f44bc8fce4985531f858048e2aeee9d0