Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 01:07
Static task
static1
Behavioral task
behavioral1
Sample
0a0dd74c400e848fcf84d1217695746f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a0dd74c400e848fcf84d1217695746f.exe
Resource
win10v2004-20230220-en
General
-
Target
0a0dd74c400e848fcf84d1217695746f.exe
-
Size
313KB
-
MD5
0a0dd74c400e848fcf84d1217695746f
-
SHA1
87a35d0bceabe086f8bfb0b286dd678a9c93d35a
-
SHA256
27e3ed0b63c7aaf1cdef8ff971fdf5c60fbf4507ef55343096f94ff6feb5f516
-
SHA512
4bb6df5908a505f5d2a1871f86db31ec7883bf4cecd25ad5fcf4c3f7410fbede7487b12dad1e8442b83953510aad074ba04a89f067620c07d0acc89f1973454b
-
SSDEEP
3072:8pXIEUbI/4pLTdJdBaLh6MbISGRiKT87mk/PGXZuZQ2y5gW5cF3PF1YWUqqT:MNU8ApLTd7BcpbIRR1sjFqpSdtS7
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\pgbelghm\ImagePath = "C:\\Windows\\SysWOW64\\pgbelghm\\ipsnmgga.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0a0dd74c400e848fcf84d1217695746f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 0a0dd74c400e848fcf84d1217695746f.exe -
Executes dropped EXE 1 IoCs
Processes:
ipsnmgga.exepid process 1548 ipsnmgga.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ipsnmgga.exedescription pid process target process PID 1548 set thread context of 4148 1548 ipsnmgga.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4768 sc.exe 4180 sc.exe 4968 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2076 1656 WerFault.exe 0a0dd74c400e848fcf84d1217695746f.exe 4688 1548 WerFault.exe ipsnmgga.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
0a0dd74c400e848fcf84d1217695746f.exeipsnmgga.exedescription pid process target process PID 1656 wrote to memory of 2288 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 2288 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 2288 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 800 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 800 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 800 1656 0a0dd74c400e848fcf84d1217695746f.exe cmd.exe PID 1656 wrote to memory of 4768 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4768 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4768 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4180 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4180 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4180 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4968 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4968 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 4968 1656 0a0dd74c400e848fcf84d1217695746f.exe sc.exe PID 1656 wrote to memory of 1840 1656 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 1656 wrote to memory of 1840 1656 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 1656 wrote to memory of 1840 1656 0a0dd74c400e848fcf84d1217695746f.exe netsh.exe PID 1548 wrote to memory of 4148 1548 ipsnmgga.exe svchost.exe PID 1548 wrote to memory of 4148 1548 ipsnmgga.exe svchost.exe PID 1548 wrote to memory of 4148 1548 ipsnmgga.exe svchost.exe PID 1548 wrote to memory of 4148 1548 ipsnmgga.exe svchost.exe PID 1548 wrote to memory of 4148 1548 ipsnmgga.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pgbelghm\2⤵PID:2288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ipsnmgga.exe" C:\Windows\SysWOW64\pgbelghm\2⤵PID:800
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pgbelghm binPath= "C:\Windows\SysWOW64\pgbelghm\ipsnmgga.exe /d\"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pgbelghm "wifi internet conection"2⤵
- Launches sc.exe
PID:4180
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pgbelghm2⤵
- Launches sc.exe
PID:4968
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 11962⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\pgbelghm\ipsnmgga.exeC:\Windows\SysWOW64\pgbelghm\ipsnmgga.exe /d"C:\Users\Admin\AppData\Local\Temp\0a0dd74c400e848fcf84d1217695746f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 5162⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1656 -ip 16561⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1548 -ip 15481⤵PID:1652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.6MB
MD5c0f02a9890dc0df05ccc8541425c9540
SHA17e11a6fd774dcdcd79e05de96916e8e5dd8f81d8
SHA2562053d7e8aadbbc49049e360df5abdd48af4bd53d801594cbbe146d56a9e97c9b
SHA512e4a8aa0cec183914dc2dff2d86bd710eb5648b629a6206b046070c89e849ce628995873391a428fd418b52774676a980db5cd96c172099ba2c1ea65a6ed69269
-
Filesize
12.6MB
MD5c0f02a9890dc0df05ccc8541425c9540
SHA17e11a6fd774dcdcd79e05de96916e8e5dd8f81d8
SHA2562053d7e8aadbbc49049e360df5abdd48af4bd53d801594cbbe146d56a9e97c9b
SHA512e4a8aa0cec183914dc2dff2d86bd710eb5648b629a6206b046070c89e849ce628995873391a428fd418b52774676a980db5cd96c172099ba2c1ea65a6ed69269