Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 00:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
202KB
-
MD5
9388dbeb6fdf9003fbc7ca159cfda275
-
SHA1
ff1d836222240de90ad3d75a279d9cc565869590
-
SHA256
e6eba455a3dec3f3b4f52ec852f0335b4955b6508d9d6d6b90e9c21ab293cf0a
-
SHA512
98ece8a30b01c71aacd64b9e3b0d5ffe92f5a13b4a73365dabba36be4acf11f331ee424a09b05c48279a810a77e9aff05440c201072082004b68bcdba3dea4c1
-
SSDEEP
3072:pRcFAhzF4JmYYa2Nurb9jNbpDp6JUmu5BkIs/Vr:MA/AZD3LrFmzI2V
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1740 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 5048 igvdwmhd.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 8 sc.exe 2116 sc.exe 1784 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3792 2656 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1684 2656 file.exe 100 PID 2656 wrote to memory of 1684 2656 file.exe 100 PID 2656 wrote to memory of 1684 2656 file.exe 100 PID 2656 wrote to memory of 4700 2656 file.exe 103 PID 2656 wrote to memory of 4700 2656 file.exe 103 PID 2656 wrote to memory of 4700 2656 file.exe 103 PID 2656 wrote to memory of 8 2656 file.exe 105 PID 2656 wrote to memory of 8 2656 file.exe 105 PID 2656 wrote to memory of 8 2656 file.exe 105 PID 2656 wrote to memory of 2116 2656 file.exe 107 PID 2656 wrote to memory of 2116 2656 file.exe 107 PID 2656 wrote to memory of 2116 2656 file.exe 107 PID 2656 wrote to memory of 1784 2656 file.exe 108 PID 2656 wrote to memory of 1784 2656 file.exe 108 PID 2656 wrote to memory of 1784 2656 file.exe 108 PID 2656 wrote to memory of 1740 2656 file.exe 113 PID 2656 wrote to memory of 1740 2656 file.exe 113 PID 2656 wrote to memory of 1740 2656 file.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ydxmlgux\2⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\igvdwmhd.exe" C:\Windows\SysWOW64\ydxmlgux\2⤵PID:4700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ydxmlgux binPath= "C:\Windows\SysWOW64\ydxmlgux\igvdwmhd.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:8
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ydxmlgux "wifi internet conection"2⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ydxmlgux2⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 10282⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\ydxmlgux\igvdwmhd.exeC:\Windows\SysWOW64\ydxmlgux\igvdwmhd.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2656 -ip 26561⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD566be56d319a762423d3202e3c8143716
SHA192f6075c51633f2e6aebdfb0a13ecf992596ed15
SHA256ba428b88ff6416acf441b83c9971c8743a35b3e93e71509562fdb0667b2b145b
SHA5125fdd9bf44556b1b21f5366848ad8b05732a6c64b6566fa3f3916274c57641567d8c8a5ca61b79a485036b5dbf31ea1a28b01b0c9910a7e2cf4fd129c23901a05
-
Filesize
10.2MB
MD566be56d319a762423d3202e3c8143716
SHA192f6075c51633f2e6aebdfb0a13ecf992596ed15
SHA256ba428b88ff6416acf441b83c9971c8743a35b3e93e71509562fdb0667b2b145b
SHA5125fdd9bf44556b1b21f5366848ad8b05732a6c64b6566fa3f3916274c57641567d8c8a5ca61b79a485036b5dbf31ea1a28b01b0c9910a7e2cf4fd129c23901a05