Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2023 01:07
Static task
static1
Behavioral task
behavioral1
Sample
0a0dd74c400e848fcf84d1217695746f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a0dd74c400e848fcf84d1217695746f.exe
Resource
win10v2004-20230220-en
General
-
Target
0a0dd74c400e848fcf84d1217695746f.exe
-
Size
313KB
-
MD5
0a0dd74c400e848fcf84d1217695746f
-
SHA1
87a35d0bceabe086f8bfb0b286dd678a9c93d35a
-
SHA256
27e3ed0b63c7aaf1cdef8ff971fdf5c60fbf4507ef55343096f94ff6feb5f516
-
SHA512
4bb6df5908a505f5d2a1871f86db31ec7883bf4cecd25ad5fcf4c3f7410fbede7487b12dad1e8442b83953510aad074ba04a89f067620c07d0acc89f1973454b
-
SSDEEP
3072:8pXIEUbI/4pLTdJdBaLh6MbISGRiKT87mk/PGXZuZQ2y5gW5cF3PF1YWUqqT:MNU8ApLTd7BcpbIRR1sjFqpSdtS7
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\oketpgrf = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\oketpgrf\ImagePath = "C:\\Windows\\SysWOW64\\oketpgrf\\vcbowwei.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1008 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
vcbowwei.exepid process 656 vcbowwei.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
vcbowwei.exedescription pid process target process PID 656 set thread context of 1008 656 vcbowwei.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 472 sc.exe 672 sc.exe 1884 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
0a0dd74c400e848fcf84d1217695746f.exevcbowwei.exedescription pid process target process PID 2024 wrote to memory of 872 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 872 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 872 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 872 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 2032 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 2032 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 2032 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 2032 2024 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 2024 wrote to memory of 472 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 472 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 472 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 472 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 672 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 672 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 672 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 672 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 1884 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 1884 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 1884 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 1884 2024 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 2024 wrote to memory of 1208 2024 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 2024 wrote to memory of 1208 2024 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 2024 wrote to memory of 1208 2024 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 2024 wrote to memory of 1208 2024 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe PID 656 wrote to memory of 1008 656 vcbowwei.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oketpgrf\2⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vcbowwei.exe" C:\Windows\SysWOW64\oketpgrf\2⤵PID:2032
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create oketpgrf binPath= "C:\Windows\SysWOW64\oketpgrf\vcbowwei.exe /d\"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:472
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description oketpgrf "wifi internet conection"2⤵
- Launches sc.exe
PID:672
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oketpgrf2⤵
- Launches sc.exe
PID:1884
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1208
-
-
C:\Windows\SysWOW64\oketpgrf\vcbowwei.exeC:\Windows\SysWOW64\oketpgrf\vcbowwei.exe /d"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:1008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.6MB
MD5df38f7e8a839226b2b2b590249df8c45
SHA143974f27aea19a8e8fc0cef6a51349da00ec6bf6
SHA2569e182a11d42fe7c7dc2bb807d35dbeb0afe82dd7085e451267f8f755dd63cb47
SHA5125286c8d76a7b18721e3812a2eb7fe2da4bc4081ac56b203894dc7a1718427aa9195512528ea7b371469c645668c5beeb29b2e1d6dbc312b68636c87b109cf6ac
-
Filesize
12.6MB
MD5df38f7e8a839226b2b2b590249df8c45
SHA143974f27aea19a8e8fc0cef6a51349da00ec6bf6
SHA2569e182a11d42fe7c7dc2bb807d35dbeb0afe82dd7085e451267f8f755dd63cb47
SHA5125286c8d76a7b18721e3812a2eb7fe2da4bc4081ac56b203894dc7a1718427aa9195512528ea7b371469c645668c5beeb29b2e1d6dbc312b68636c87b109cf6ac