Analysis
-
max time kernel
234s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 21:12
Static task
static1
Behavioral task
behavioral1
Sample
097bc3c7d6f6f50a503fdb7a56e22a34.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
097bc3c7d6f6f50a503fdb7a56e22a34.exe
Resource
win10v2004-20230221-en
General
-
Target
097bc3c7d6f6f50a503fdb7a56e22a34.exe
-
Size
312KB
-
MD5
097bc3c7d6f6f50a503fdb7a56e22a34
-
SHA1
bc801204c76b73ee9e66a9a7bdffd856965604e0
-
SHA256
25ed67b390cafbd1ebcebed4c9cad13c38e6998c45e501e23d6652ac04bb69ef
-
SHA512
7dedbefbe0a0af1d1541374a1a8916eb45d6037c15b8ae36ed28c4dfc0a9d22f5062b584b856b8d32cf5d675f1a718b31b029dc5abcea4c40d8925ae42f05eea
-
SSDEEP
3072:6AX8ODio3+FCLQbFK+OCQ/KbqAjxBn7UJIdg6hO3Vd+eVRg/5wcw3P3XqT:vPDl5L0FKBDKbzBYd6upvG
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jubxzywc\ImagePath = "C:\\Windows\\SysWOW64\\jubxzywc\\kzrydbgy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
097bc3c7d6f6f50a503fdb7a56e22a34.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 097bc3c7d6f6f50a503fdb7a56e22a34.exe -
Executes dropped EXE 1 IoCs
Processes:
kzrydbgy.exepid process 4844 kzrydbgy.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kzrydbgy.exedescription pid process target process PID 4844 set thread context of 652 4844 kzrydbgy.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4652 sc.exe 4996 sc.exe 4920 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1764 3332 WerFault.exe 097bc3c7d6f6f50a503fdb7a56e22a34.exe 1852 4844 WerFault.exe kzrydbgy.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
097bc3c7d6f6f50a503fdb7a56e22a34.exekzrydbgy.exedescription pid process target process PID 3332 wrote to memory of 404 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 404 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 404 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 2692 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 2692 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 2692 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe cmd.exe PID 3332 wrote to memory of 4652 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4652 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4652 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4996 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4996 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4996 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4920 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4920 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 4920 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe sc.exe PID 3332 wrote to memory of 5000 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe netsh.exe PID 3332 wrote to memory of 5000 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe netsh.exe PID 3332 wrote to memory of 5000 3332 097bc3c7d6f6f50a503fdb7a56e22a34.exe netsh.exe PID 4844 wrote to memory of 652 4844 kzrydbgy.exe svchost.exe PID 4844 wrote to memory of 652 4844 kzrydbgy.exe svchost.exe PID 4844 wrote to memory of 652 4844 kzrydbgy.exe svchost.exe PID 4844 wrote to memory of 652 4844 kzrydbgy.exe svchost.exe PID 4844 wrote to memory of 652 4844 kzrydbgy.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\097bc3c7d6f6f50a503fdb7a56e22a34.exe"C:\Users\Admin\AppData\Local\Temp\097bc3c7d6f6f50a503fdb7a56e22a34.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jubxzywc\2⤵PID:404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kzrydbgy.exe" C:\Windows\SysWOW64\jubxzywc\2⤵PID:2692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jubxzywc binPath= "C:\Windows\SysWOW64\jubxzywc\kzrydbgy.exe /d\"C:\Users\Admin\AppData\Local\Temp\097bc3c7d6f6f50a503fdb7a56e22a34.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jubxzywc "wifi internet conection"2⤵
- Launches sc.exe
PID:4996
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jubxzywc2⤵
- Launches sc.exe
PID:4920
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 10402⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\jubxzywc\kzrydbgy.exeC:\Windows\SysWOW64\jubxzywc\kzrydbgy.exe /d"C:\Users\Admin\AppData\Local\Temp\097bc3c7d6f6f50a503fdb7a56e22a34.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 5162⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3332 -ip 33321⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4844 -ip 48441⤵PID:1832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.7MB
MD5637a82fbb9932b9f21ba291e34f7b40a
SHA101c49179f3382cf4f96c2e9e16e8fa669b6dc6fc
SHA25670e05eaf4f9275cbd2b8a8720754beef860b8666fb0f464c8210e759d119ae3f
SHA5125e4a15f6fd549d4602f27f23033fa866a494bca089cb8b08cd2e731e7e261bcf80dfb3d1c6c7b7001d5aa805a10a87e1fda50a141e52d252c426390722342347
-
Filesize
10.7MB
MD5637a82fbb9932b9f21ba291e34f7b40a
SHA101c49179f3382cf4f96c2e9e16e8fa669b6dc6fc
SHA25670e05eaf4f9275cbd2b8a8720754beef860b8666fb0f464c8210e759d119ae3f
SHA5125e4a15f6fd549d4602f27f23033fa866a494bca089cb8b08cd2e731e7e261bcf80dfb3d1c6c7b7001d5aa805a10a87e1fda50a141e52d252c426390722342347