Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 06:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
298KB
-
MD5
b7c137a18093f43fa0ac50865cc34f9c
-
SHA1
93727de39d92f6934d4ddee26728b207a212428e
-
SHA256
63e235b92d97d6c3d5a5dca42f31279b674d3140affc1e26c5971d12fc1d7667
-
SHA512
40683347b6f3dd2f18d15d5bfaa64d98f6ca88d1497bac811483366c59e5c786914dd32445981f774666b20053390f18d5a01f278162ba85bf75866edf6c95d6
-
SSDEEP
3072:/UgGk8D2CKiH+U3XmE5kDOXkqVDE/zpUp+rqdyy76kgREiwUP7A6qVxWm5iT/Hrq:Ret/X/GDwpELm04B710Ej2qVA8i
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qigyihwj\ImagePath = "C:\\Windows\\SysWOW64\\qigyihwj\\jvdagtzx.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
Processes:
jvdagtzx.exepid process 4456 jvdagtzx.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jvdagtzx.exedescription pid process target process PID 4456 set thread context of 3544 4456 jvdagtzx.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3000 sc.exe 4356 sc.exe 1048 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3752 2700 WerFault.exe file.exe 3856 4456 WerFault.exe jvdagtzx.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
file.exejvdagtzx.exedescription pid process target process PID 2700 wrote to memory of 1224 2700 file.exe cmd.exe PID 2700 wrote to memory of 1224 2700 file.exe cmd.exe PID 2700 wrote to memory of 1224 2700 file.exe cmd.exe PID 2700 wrote to memory of 944 2700 file.exe cmd.exe PID 2700 wrote to memory of 944 2700 file.exe cmd.exe PID 2700 wrote to memory of 944 2700 file.exe cmd.exe PID 2700 wrote to memory of 3000 2700 file.exe sc.exe PID 2700 wrote to memory of 3000 2700 file.exe sc.exe PID 2700 wrote to memory of 3000 2700 file.exe sc.exe PID 2700 wrote to memory of 4356 2700 file.exe sc.exe PID 2700 wrote to memory of 4356 2700 file.exe sc.exe PID 2700 wrote to memory of 4356 2700 file.exe sc.exe PID 2700 wrote to memory of 1048 2700 file.exe sc.exe PID 2700 wrote to memory of 1048 2700 file.exe sc.exe PID 2700 wrote to memory of 1048 2700 file.exe sc.exe PID 2700 wrote to memory of 3256 2700 file.exe netsh.exe PID 2700 wrote to memory of 3256 2700 file.exe netsh.exe PID 2700 wrote to memory of 3256 2700 file.exe netsh.exe PID 4456 wrote to memory of 3544 4456 jvdagtzx.exe svchost.exe PID 4456 wrote to memory of 3544 4456 jvdagtzx.exe svchost.exe PID 4456 wrote to memory of 3544 4456 jvdagtzx.exe svchost.exe PID 4456 wrote to memory of 3544 4456 jvdagtzx.exe svchost.exe PID 4456 wrote to memory of 3544 4456 jvdagtzx.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qigyihwj\2⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jvdagtzx.exe" C:\Windows\SysWOW64\qigyihwj\2⤵PID:944
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qigyihwj binPath= "C:\Windows\SysWOW64\qigyihwj\jvdagtzx.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qigyihwj "wifi internet conection"2⤵
- Launches sc.exe
PID:4356
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qigyihwj2⤵
- Launches sc.exe
PID:1048
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 10362⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\qigyihwj\jvdagtzx.exeC:\Windows\SysWOW64\qigyihwj\jvdagtzx.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 5082⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2700 -ip 27001⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4456 -ip 44561⤵PID:2708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD59899a62a6ec6e568a3aa38460b16b7d5
SHA14d014a6e3b3f463f64d789f53a5654aa884af8df
SHA2568f7e747f5c2c414ca8e0c55f689884df397c975066c74586afebf43816dfdcf0
SHA51202d82ccb0a09d9d961af1937c34346a2563849f3ca8f9a5ce4cc5186f4f6fbe755fd9df9a98f2337ac344bfb61d85f81995ae55c6e6fb7d911e3aed37e72850a
-
Filesize
13.3MB
MD59899a62a6ec6e568a3aa38460b16b7d5
SHA14d014a6e3b3f463f64d789f53a5654aa884af8df
SHA2568f7e747f5c2c414ca8e0c55f689884df397c975066c74586afebf43816dfdcf0
SHA51202d82ccb0a09d9d961af1937c34346a2563849f3ca8f9a5ce4cc5186f4f6fbe755fd9df9a98f2337ac344bfb61d85f81995ae55c6e6fb7d911e3aed37e72850a