Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2023 18:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
351KB
-
MD5
2eb8c0882b1ad0705cad453aa0b8b283
-
SHA1
ebd2e309e0ba0df58de9ce24314191a6ba441272
-
SHA256
26459555ede3d63618aea53dad29b000e26f9bb13304b4a446f9ee167f78a8fc
-
SHA512
28361092add39da688172d7d25c4b00150af33ee0636031aa3023d7475c7649bbfa3ab0ea5298cef977497c66bc80a1d8f9418c690fdcf97c1df2c15578dc2ac
-
SSDEEP
3072:fBW5Cc85YwVButS8rZuc7icDaCHcwIlzXJa1eGE6JMSrXGUNuIycfr/Y4XdDtwBx:ZWvxwTOicS1/DFSLZuIx/Y4tRAwe4
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gljdeyib\ImagePath = "C:\\Windows\\SysWOW64\\gljdeyib\\frzwcpvt.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
Processes:
frzwcpvt.exepid process 2228 frzwcpvt.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
frzwcpvt.exedescription pid process target process PID 2228 set thread context of 3260 2228 frzwcpvt.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3916 sc.exe 224 sc.exe 4476 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1512 4108 WerFault.exe file.exe 4488 2228 WerFault.exe frzwcpvt.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 0490763c8b27200124edb47d450dd49d084297dce82e72baa492abfd84207c1dea1f421681cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56811d8874b743eedab644490bdb67d22e5905505cff1bc54758df21d5904e0a56a13da874f7134e2a864419bdce0286682cd0934c9c4e4241dd69d430b36fca66914ddb40e367b8be90d4091bdb67d26e49c5400cef6bb54718bce15515bb9fd3041ed85487138e7ab541ecd8484a9341ca4e2de49988d541de4ac743d04bafb2f4fb2c70f320dd49d642df4bd843a7e54b22834fdc48d57d1f6ae743d04ccac6d0adb82537338faaf5119f4bd844d14dda46d34fdc48d541de4ad743d04cd945d24edb47d440dd49d642df4bd844d14dda46d34fdc48d541de4ad743d04cd775c24ed svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
file.exefrzwcpvt.exedescription pid process target process PID 4108 wrote to memory of 3132 4108 file.exe cmd.exe PID 4108 wrote to memory of 3132 4108 file.exe cmd.exe PID 4108 wrote to memory of 3132 4108 file.exe cmd.exe PID 4108 wrote to memory of 1972 4108 file.exe cmd.exe PID 4108 wrote to memory of 1972 4108 file.exe cmd.exe PID 4108 wrote to memory of 1972 4108 file.exe cmd.exe PID 4108 wrote to memory of 3916 4108 file.exe sc.exe PID 4108 wrote to memory of 3916 4108 file.exe sc.exe PID 4108 wrote to memory of 3916 4108 file.exe sc.exe PID 4108 wrote to memory of 224 4108 file.exe sc.exe PID 4108 wrote to memory of 224 4108 file.exe sc.exe PID 4108 wrote to memory of 224 4108 file.exe sc.exe PID 4108 wrote to memory of 4476 4108 file.exe sc.exe PID 4108 wrote to memory of 4476 4108 file.exe sc.exe PID 4108 wrote to memory of 4476 4108 file.exe sc.exe PID 4108 wrote to memory of 4712 4108 file.exe netsh.exe PID 4108 wrote to memory of 4712 4108 file.exe netsh.exe PID 4108 wrote to memory of 4712 4108 file.exe netsh.exe PID 2228 wrote to memory of 3260 2228 frzwcpvt.exe svchost.exe PID 2228 wrote to memory of 3260 2228 frzwcpvt.exe svchost.exe PID 2228 wrote to memory of 3260 2228 frzwcpvt.exe svchost.exe PID 2228 wrote to memory of 3260 2228 frzwcpvt.exe svchost.exe PID 2228 wrote to memory of 3260 2228 frzwcpvt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gljdeyib\2⤵PID:3132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\frzwcpvt.exe" C:\Windows\SysWOW64\gljdeyib\2⤵PID:1972
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gljdeyib binPath= "C:\Windows\SysWOW64\gljdeyib\frzwcpvt.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3916
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gljdeyib "wifi internet conection"2⤵
- Launches sc.exe
PID:224
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gljdeyib2⤵
- Launches sc.exe
PID:4476
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 7722⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\gljdeyib\frzwcpvt.exeC:\Windows\SysWOW64\gljdeyib\frzwcpvt.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 5122⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 41081⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2228 -ip 22281⤵PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.5MB
MD5a6f0c6b391cffab576eed10f3f4b8b67
SHA1db02cc5fca00084edfc5c4670452071f8ea4709f
SHA256b809292e6d4b5237946ae8788a17a2dc690eec799947270ae6f2250418624753
SHA5124e2a92af3b96cffca6c33cc393d00138c0062cd1a7e1b4308576685cdda30d6dc23c9c718ce58b379a9212c11b30b9ec6a2fa8ae262ae5bb5b627e4ad5bec9a5
-
Filesize
13.5MB
MD5a6f0c6b391cffab576eed10f3f4b8b67
SHA1db02cc5fca00084edfc5c4670452071f8ea4709f
SHA256b809292e6d4b5237946ae8788a17a2dc690eec799947270ae6f2250418624753
SHA5124e2a92af3b96cffca6c33cc393d00138c0062cd1a7e1b4308576685cdda30d6dc23c9c718ce58b379a9212c11b30b9ec6a2fa8ae262ae5bb5b627e4ad5bec9a5