Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2023 11:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
268KB
-
MD5
9b30c442d1e5f79e00beb59519f49bf1
-
SHA1
e3f97e75276ba3b4756275bc1796396369b07b68
-
SHA256
c30132d930b44ed9f7cbb78be47c9c3fb0bd0d34c3e0548304802c7c617cd185
-
SHA512
931b892d036c75da6b8a7aeeb282e21d7715c52a2ab3a5636e38ddffadcb9be1261a26c7ae4407964d29c7caac526ec963fcc75cb3b76bf21ff3fb41b3dee931
-
SSDEEP
3072:JoB1eK1AKuLq7ITFIiAq4pe5/kdg82Pd+YzF+UFOFQh91ESuPjco5E5WqFmcJObK:GB1IKuLiITpAqHFo0+oOFO7BI5qFBSw
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\scfdgiti = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\scfdgiti\ImagePath = "C:\\Windows\\SysWOW64\\scfdgiti\\oeebnzpn.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1444 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
oeebnzpn.exepid process 1048 oeebnzpn.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
oeebnzpn.exedescription pid process target process PID 1048 set thread context of 1444 1048 oeebnzpn.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1724 sc.exe 556 sc.exe 428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
file.exeoeebnzpn.exedescription pid process target process PID 1232 wrote to memory of 1236 1232 file.exe cmd.exe PID 1232 wrote to memory of 1236 1232 file.exe cmd.exe PID 1232 wrote to memory of 1236 1232 file.exe cmd.exe PID 1232 wrote to memory of 1236 1232 file.exe cmd.exe PID 1232 wrote to memory of 1484 1232 file.exe cmd.exe PID 1232 wrote to memory of 1484 1232 file.exe cmd.exe PID 1232 wrote to memory of 1484 1232 file.exe cmd.exe PID 1232 wrote to memory of 1484 1232 file.exe cmd.exe PID 1232 wrote to memory of 1724 1232 file.exe sc.exe PID 1232 wrote to memory of 1724 1232 file.exe sc.exe PID 1232 wrote to memory of 1724 1232 file.exe sc.exe PID 1232 wrote to memory of 1724 1232 file.exe sc.exe PID 1232 wrote to memory of 556 1232 file.exe sc.exe PID 1232 wrote to memory of 556 1232 file.exe sc.exe PID 1232 wrote to memory of 556 1232 file.exe sc.exe PID 1232 wrote to memory of 556 1232 file.exe sc.exe PID 1232 wrote to memory of 428 1232 file.exe sc.exe PID 1232 wrote to memory of 428 1232 file.exe sc.exe PID 1232 wrote to memory of 428 1232 file.exe sc.exe PID 1232 wrote to memory of 428 1232 file.exe sc.exe PID 1232 wrote to memory of 1984 1232 file.exe netsh.exe PID 1232 wrote to memory of 1984 1232 file.exe netsh.exe PID 1232 wrote to memory of 1984 1232 file.exe netsh.exe PID 1232 wrote to memory of 1984 1232 file.exe netsh.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe PID 1048 wrote to memory of 1444 1048 oeebnzpn.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\scfdgiti\2⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oeebnzpn.exe" C:\Windows\SysWOW64\scfdgiti\2⤵PID:1484
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create scfdgiti binPath= "C:\Windows\SysWOW64\scfdgiti\oeebnzpn.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description scfdgiti "wifi internet conection"2⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start scfdgiti2⤵
- Launches sc.exe
PID:428
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1984
-
-
C:\Windows\SysWOW64\scfdgiti\oeebnzpn.exeC:\Windows\SysWOW64\scfdgiti\oeebnzpn.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5b7078c8686d33fceb452647e9c31e655
SHA1912ebaad8f1b766601c3eaf9aa45607f7a52317a
SHA256d387504746f1bee010853cda4741f6328189c323a9e1de31524fc09524cd4861
SHA5123dbdac558fe80d171eb2d1cd71c2490caf21cc0e060c0a1108871eb047c8a302889ce169e2248cbb91021991060d57e6c6d4a7ab147cc9073e60606378a2b0c1
-
Filesize
10.3MB
MD5b7078c8686d33fceb452647e9c31e655
SHA1912ebaad8f1b766601c3eaf9aa45607f7a52317a
SHA256d387504746f1bee010853cda4741f6328189c323a9e1de31524fc09524cd4861
SHA5123dbdac558fe80d171eb2d1cd71c2490caf21cc0e060c0a1108871eb047c8a302889ce169e2248cbb91021991060d57e6c6d4a7ab147cc9073e60606378a2b0c1