Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 16:14
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
235KB
-
MD5
cebfc9645b080c19ca29154ed4fbe4ab
-
SHA1
2de92713f76bbfd4f455be2146c5e890ea41e6a0
-
SHA256
8299a18a6f137c931988ad6e1f68e99240c02fc765bdf37beb652b39d91fa822
-
SHA512
4836f50f24f3320370e54ab35ea695ef4f8e2008757192ae5b93581b28a108c40792bd515053f2af8f1446df59c8d6c30b1334426aea790b8854393875f2cd8e
-
SSDEEP
3072:bUPv9wTIHrDRHV5JCdezw0OU9c0WAwnxLYdNfD/e8h1lGtYEZllNHwh+LOb3TYtq:QHKIHZVnCD0PVU6bGHZf5sLbDYt+
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\oqfgwhll = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\oqfgwhll\ImagePath = "C:\\Windows\\SysWOW64\\oqfgwhll\\semjpcig.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1328 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
semjpcig.exepid process 1656 semjpcig.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
semjpcig.exedescription pid process target process PID 1656 set thread context of 1328 1656 semjpcig.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 560 sc.exe 468 sc.exe 1740 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
file.exesemjpcig.exedescription pid process target process PID 1976 wrote to memory of 1944 1976 file.exe cmd.exe PID 1976 wrote to memory of 1944 1976 file.exe cmd.exe PID 1976 wrote to memory of 1944 1976 file.exe cmd.exe PID 1976 wrote to memory of 1944 1976 file.exe cmd.exe PID 1976 wrote to memory of 1688 1976 file.exe cmd.exe PID 1976 wrote to memory of 1688 1976 file.exe cmd.exe PID 1976 wrote to memory of 1688 1976 file.exe cmd.exe PID 1976 wrote to memory of 1688 1976 file.exe cmd.exe PID 1976 wrote to memory of 560 1976 file.exe sc.exe PID 1976 wrote to memory of 560 1976 file.exe sc.exe PID 1976 wrote to memory of 560 1976 file.exe sc.exe PID 1976 wrote to memory of 560 1976 file.exe sc.exe PID 1976 wrote to memory of 468 1976 file.exe sc.exe PID 1976 wrote to memory of 468 1976 file.exe sc.exe PID 1976 wrote to memory of 468 1976 file.exe sc.exe PID 1976 wrote to memory of 468 1976 file.exe sc.exe PID 1976 wrote to memory of 1740 1976 file.exe sc.exe PID 1976 wrote to memory of 1740 1976 file.exe sc.exe PID 1976 wrote to memory of 1740 1976 file.exe sc.exe PID 1976 wrote to memory of 1740 1976 file.exe sc.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe PID 1976 wrote to memory of 1768 1976 file.exe netsh.exe PID 1976 wrote to memory of 1768 1976 file.exe netsh.exe PID 1976 wrote to memory of 1768 1976 file.exe netsh.exe PID 1976 wrote to memory of 1768 1976 file.exe netsh.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe PID 1656 wrote to memory of 1328 1656 semjpcig.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oqfgwhll\2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\semjpcig.exe" C:\Windows\SysWOW64\oqfgwhll\2⤵PID:1688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create oqfgwhll binPath= "C:\Windows\SysWOW64\oqfgwhll\semjpcig.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:560
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description oqfgwhll "wifi internet conection"2⤵
- Launches sc.exe
PID:468
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oqfgwhll2⤵
- Launches sc.exe
PID:1740
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1768
-
-
C:\Windows\SysWOW64\oqfgwhll\semjpcig.exeC:\Windows\SysWOW64\oqfgwhll\semjpcig.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.5MB
MD504ae37d1dfae0c1464a638a137ad1063
SHA1e79f75ceaf560d1ec4edede4aa8452fe5b4a8545
SHA256a5cbca289855fcd62e03cbb762288c94426fd4718ec0c25e228670b89c2a3533
SHA5121b9c8a8c27f655cc6f423602ca55b3b6e5bdb1a72eace76691968982ae59c0c54b71c558c9705b6048e01400a5325d665d4ae78932777fdefca62cd7181d7ce8
-
Filesize
13.5MB
MD504ae37d1dfae0c1464a638a137ad1063
SHA1e79f75ceaf560d1ec4edede4aa8452fe5b4a8545
SHA256a5cbca289855fcd62e03cbb762288c94426fd4718ec0c25e228670b89c2a3533
SHA5121b9c8a8c27f655cc6f423602ca55b3b6e5bdb1a72eace76691968982ae59c0c54b71c558c9705b6048e01400a5325d665d4ae78932777fdefca62cd7181d7ce8