Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 02:11
Static task
static1
Behavioral task
behavioral1
Sample
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
Resource
win10v2004-20230220-en
General
-
Target
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
-
Size
302KB
-
MD5
c47f32f68a1ca3309768b48ec98cd752
-
SHA1
ab24f2d6a2cacd0b807b2a174e4c43e8d629b32e
-
SHA256
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b
-
SHA512
747db0d277eac21cdb2f51862fe861e27b444bdae4ed08bcc92a92d27c75c6ee602723fa102a3501f980bea18bd2c9a500113c6e9cf42d752240e145b1bd610d
-
SSDEEP
3072:Muy7xHO5Ur+3sfGjmvp8hPdJidlfZl8ebAGMR5zODTKchd+OH:xy7xHvrmsejm6d2NZlDAGMHOKcv+y
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nzzzvfui\ImagePath = "C:\\Windows\\SysWOW64\\nzzzvfui\\tahkzngq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe -
Executes dropped EXE 1 IoCs
Processes:
tahkzngq.exepid process 3756 tahkzngq.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tahkzngq.exedescription pid process target process PID 3756 set thread context of 3428 3756 tahkzngq.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1472 sc.exe 1076 sc.exe 112 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4104 396 WerFault.exe de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe 2616 3756 WerFault.exe tahkzngq.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exetahkzngq.exedescription pid process target process PID 396 wrote to memory of 4108 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 4108 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 4108 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 3524 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 3524 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 3524 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe cmd.exe PID 396 wrote to memory of 1472 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 1472 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 1472 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 1076 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 1076 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 1076 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 112 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 112 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 112 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe sc.exe PID 396 wrote to memory of 4008 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe netsh.exe PID 396 wrote to memory of 4008 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe netsh.exe PID 396 wrote to memory of 4008 396 de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe netsh.exe PID 3756 wrote to memory of 3428 3756 tahkzngq.exe svchost.exe PID 3756 wrote to memory of 3428 3756 tahkzngq.exe svchost.exe PID 3756 wrote to memory of 3428 3756 tahkzngq.exe svchost.exe PID 3756 wrote to memory of 3428 3756 tahkzngq.exe svchost.exe PID 3756 wrote to memory of 3428 3756 tahkzngq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe"C:\Users\Admin\AppData\Local\Temp\de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nzzzvfui\2⤵PID:4108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tahkzngq.exe" C:\Windows\SysWOW64\nzzzvfui\2⤵PID:3524
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nzzzvfui binPath= "C:\Windows\SysWOW64\nzzzvfui\tahkzngq.exe /d\"C:\Users\Admin\AppData\Local\Temp\de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nzzzvfui "wifi internet conection"2⤵
- Launches sc.exe
PID:1076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nzzzvfui2⤵
- Launches sc.exe
PID:112
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 7722⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\nzzzvfui\tahkzngq.exeC:\Windows\SysWOW64\nzzzvfui\tahkzngq.exe /d"C:\Users\Admin\AppData\Local\Temp\de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 5122⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 396 -ip 3961⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3756 -ip 37561⤵PID:3296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD570047f5d8fa250136fed03336e705e45
SHA1b8e5777f259ab73ac1cbb6d1426490ec00451c28
SHA2565e345d0d99d5429f1e5bfe1d8da8d3a966627a03a1e4cd1340427b59aa1decc7
SHA512b2c19e07f69e05086c5b437a6ceecc6868ad49ac6839cdab64f30490b0607b7bef4da16e9b9755594de6358d60efefdb35861d1e5596b9f7312763d12cf75473
-
Filesize
11.5MB
MD570047f5d8fa250136fed03336e705e45
SHA1b8e5777f259ab73ac1cbb6d1426490ec00451c28
SHA2565e345d0d99d5429f1e5bfe1d8da8d3a966627a03a1e4cd1340427b59aa1decc7
SHA512b2c19e07f69e05086c5b437a6ceecc6868ad49ac6839cdab64f30490b0607b7bef4da16e9b9755594de6358d60efefdb35861d1e5596b9f7312763d12cf75473