Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
193KB
-
MD5
85566c0e8a1a7493e65abc47e1ed2f52
-
SHA1
0fc665eb362732bb0f3749968c60271439e606b4
-
SHA256
4f82ce0fc03fc61ebb8ee507e02d53c4ef047b612d32954d48679ec0e31857eb
-
SHA512
2b3d77f8a035d729e40e9285ea02eaff18b7b6383a05f1c9eba477eec4c988000a49c7a19013d53963b1c802ecd26968ca0e4c90423b342b11dc280803158892
-
SSDEEP
3072:VTeAgFiHFfxX/uC7TU8nS/USEeiHBSIykHrWzcE502+ovV:yilfxBm/dlihRyWqnZV
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 440 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 3260 rdpurxwk.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1696 sc.exe 208 sc.exe 4144 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2524 4740 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4740 wrote to memory of 1280 4740 file.exe 100 PID 4740 wrote to memory of 1280 4740 file.exe 100 PID 4740 wrote to memory of 1280 4740 file.exe 100 PID 4740 wrote to memory of 880 4740 file.exe 102 PID 4740 wrote to memory of 880 4740 file.exe 102 PID 4740 wrote to memory of 880 4740 file.exe 102 PID 4740 wrote to memory of 1696 4740 file.exe 104 PID 4740 wrote to memory of 1696 4740 file.exe 104 PID 4740 wrote to memory of 1696 4740 file.exe 104 PID 4740 wrote to memory of 208 4740 file.exe 106 PID 4740 wrote to memory of 208 4740 file.exe 106 PID 4740 wrote to memory of 208 4740 file.exe 106 PID 4740 wrote to memory of 4144 4740 file.exe 108 PID 4740 wrote to memory of 4144 4740 file.exe 108 PID 4740 wrote to memory of 4144 4740 file.exe 108 PID 4740 wrote to memory of 440 4740 file.exe 110 PID 4740 wrote to memory of 440 4740 file.exe 110 PID 4740 wrote to memory of 440 4740 file.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\drmcflyq\2⤵PID:1280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rdpurxwk.exe" C:\Windows\SysWOW64\drmcflyq\2⤵PID:880
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create drmcflyq binPath= "C:\Windows\SysWOW64\drmcflyq\rdpurxwk.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description drmcflyq "wifi internet conection"2⤵
- Launches sc.exe
PID:208
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start drmcflyq2⤵
- Launches sc.exe
PID:4144
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 12602⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\drmcflyq\rdpurxwk.exeC:\Windows\SysWOW64\drmcflyq\rdpurxwk.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4740 -ip 47401⤵PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD562024b53b011f1f6c72821116595fe87
SHA1efee57871457affb0a862c00c692a649264e2f7d
SHA256fe5da4ccc1fc04c831a440697a064ec2deb4d449f45a3ca72eafeccb89d43237
SHA5121233d52c23d83c79ff7726d6844c5e129bda2cdc3a4f3eb3be4fb73a25a7a0dbfcea7a5128e3d091d1079297014a3d9eadf21d93c18c896bc0d0aa12a44b0a1c
-
Filesize
14.2MB
MD562024b53b011f1f6c72821116595fe87
SHA1efee57871457affb0a862c00c692a649264e2f7d
SHA256fe5da4ccc1fc04c831a440697a064ec2deb4d449f45a3ca72eafeccb89d43237
SHA5121233d52c23d83c79ff7726d6844c5e129bda2cdc3a4f3eb3be4fb73a25a7a0dbfcea7a5128e3d091d1079297014a3d9eadf21d93c18c896bc0d0aa12a44b0a1c