Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 20:49
Static task
static1
Behavioral task
behavioral1
Sample
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe
Resource
win10v2004-20230220-en
General
-
Target
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe
-
Size
276KB
-
MD5
80ee506064ae22c8ea34ffb2431f2488
-
SHA1
0c5a71beb97751a781203d598e97e5a746df62df
-
SHA256
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb
-
SHA512
39be470cc5e8f170296371c7cfb7727b402e4c8b6e1ea6d66fe4195aa83f090cb9cf17d941dbb15214ae9e0a20f0015a190eb35a563067f2d645ea3f21609a6c
-
SSDEEP
3072:/3czQeDsw9vCdirSqJ4GGueYDDwOtDUeblv8zMrnwg5o6JP3WJ0nWFok:GQmstdiDJ4xuHDwiDpd8z+w56J+Dak
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tfdmsxeo\ImagePath = "C:\\Windows\\SysWOW64\\tfdmsxeo\\ipwzocvf.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe -
Executes dropped EXE 1 IoCs
Processes:
ipwzocvf.exepid process 4684 ipwzocvf.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ipwzocvf.exedescription pid process target process PID 4684 set thread context of 1712 4684 ipwzocvf.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 232 sc.exe 1844 sc.exe 2312 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3456 2196 WerFault.exe 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe 1816 4684 WerFault.exe ipwzocvf.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exeipwzocvf.exedescription pid process target process PID 2196 wrote to memory of 1508 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1508 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1508 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1736 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1736 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1736 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe cmd.exe PID 2196 wrote to memory of 1844 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 1844 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 1844 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 2312 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 2312 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 2312 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 232 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 232 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 232 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe sc.exe PID 2196 wrote to memory of 3356 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe netsh.exe PID 2196 wrote to memory of 3356 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe netsh.exe PID 2196 wrote to memory of 3356 2196 77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe netsh.exe PID 4684 wrote to memory of 1712 4684 ipwzocvf.exe svchost.exe PID 4684 wrote to memory of 1712 4684 ipwzocvf.exe svchost.exe PID 4684 wrote to memory of 1712 4684 ipwzocvf.exe svchost.exe PID 4684 wrote to memory of 1712 4684 ipwzocvf.exe svchost.exe PID 4684 wrote to memory of 1712 4684 ipwzocvf.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe"C:\Users\Admin\AppData\Local\Temp\77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tfdmsxeo\2⤵PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ipwzocvf.exe" C:\Windows\SysWOW64\tfdmsxeo\2⤵PID:1736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tfdmsxeo binPath= "C:\Windows\SysWOW64\tfdmsxeo\ipwzocvf.exe /d\"C:\Users\Admin\AppData\Local\Temp\77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1844
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tfdmsxeo "wifi internet conection"2⤵
- Launches sc.exe
PID:2312
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tfdmsxeo2⤵
- Launches sc.exe
PID:232
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 10322⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\tfdmsxeo\ipwzocvf.exeC:\Windows\SysWOW64\tfdmsxeo\ipwzocvf.exe /d"C:\Users\Admin\AppData\Local\Temp\77b5c60d25ee308a2c29e9363e105bfc42b3f0c6eb92285b620454f9c952d1eb.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 5562⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2196 -ip 21961⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4684 -ip 46841⤵PID:4272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.5MB
MD5e9cb71266803e7b0d0d2d29621a4cf78
SHA1b7c855e27705411658105e25e2a25c23184824dd
SHA256d70ee721a3f4ef663e7a95385fe7a10919d751b5110675c98bf847d7724e449d
SHA5120efb9de0821005f264752de64170fa30669699e46da62ffa4227b7d5e6bc3e41cfe3f2c4d297dffdcd93b7ca55c0b4846d0c8bbe920a788fa39259e946045b10
-
Filesize
13.5MB
MD5e9cb71266803e7b0d0d2d29621a4cf78
SHA1b7c855e27705411658105e25e2a25c23184824dd
SHA256d70ee721a3f4ef663e7a95385fe7a10919d751b5110675c98bf847d7724e449d
SHA5120efb9de0821005f264752de64170fa30669699e46da62ffa4227b7d5e6bc3e41cfe3f2c4d297dffdcd93b7ca55c0b4846d0c8bbe920a788fa39259e946045b10