Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 23:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
293KB
-
MD5
b4da9897cf577c55aa364a57ce6d6ab6
-
SHA1
8d2c6b7c0496be939c94db11c1deed3761aa36b1
-
SHA256
dc1bc9d08ef773a4d935b0051c240ef1b9f2ce8dcc000063ffdcab1ef6bd1d50
-
SHA512
57e0754e00f7e70a21bf6c2a062fe7b76c422b530b62236455689540f2c1ffb22caac3e936cb4f6616db7558a9b2a81a70103d11449c7ac5bb70c9cb38887d02
-
SSDEEP
3072:mlNvrtDJVoihS660sTdgmfJFXNQ25xSA2SXux02PiaJxas/aT:E5oihS660shgmfLN/50yXuL/a
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2640 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 pnxyawzf.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2784 sc.exe 2200 sc.exe 2960 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2312 1256 file.exe 28 PID 1256 wrote to memory of 2312 1256 file.exe 28 PID 1256 wrote to memory of 2312 1256 file.exe 28 PID 1256 wrote to memory of 2312 1256 file.exe 28 PID 1256 wrote to memory of 2788 1256 file.exe 30 PID 1256 wrote to memory of 2788 1256 file.exe 30 PID 1256 wrote to memory of 2788 1256 file.exe 30 PID 1256 wrote to memory of 2788 1256 file.exe 30 PID 1256 wrote to memory of 2200 1256 file.exe 32 PID 1256 wrote to memory of 2200 1256 file.exe 32 PID 1256 wrote to memory of 2200 1256 file.exe 32 PID 1256 wrote to memory of 2200 1256 file.exe 32 PID 1256 wrote to memory of 2960 1256 file.exe 34 PID 1256 wrote to memory of 2960 1256 file.exe 34 PID 1256 wrote to memory of 2960 1256 file.exe 34 PID 1256 wrote to memory of 2960 1256 file.exe 34 PID 1256 wrote to memory of 2784 1256 file.exe 36 PID 1256 wrote to memory of 2784 1256 file.exe 36 PID 1256 wrote to memory of 2784 1256 file.exe 36 PID 1256 wrote to memory of 2784 1256 file.exe 36 PID 1256 wrote to memory of 2640 1256 file.exe 38 PID 1256 wrote to memory of 2640 1256 file.exe 38 PID 1256 wrote to memory of 2640 1256 file.exe 38 PID 1256 wrote to memory of 2640 1256 file.exe 38 PID 2564 wrote to memory of 2552 2564 pnxyawzf.exe 41 PID 2564 wrote to memory of 2552 2564 pnxyawzf.exe 41 PID 2564 wrote to memory of 2552 2564 pnxyawzf.exe 41 PID 2564 wrote to memory of 2552 2564 pnxyawzf.exe 41 PID 2564 wrote to memory of 2552 2564 pnxyawzf.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jwwlxfqx\2⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pnxyawzf.exe" C:\Windows\SysWOW64\jwwlxfqx\2⤵PID:2788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jwwlxfqx binPath= "C:\Windows\SysWOW64\jwwlxfqx\pnxyawzf.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jwwlxfqx "wifi internet conection"2⤵
- Launches sc.exe
PID:2960
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jwwlxfqx2⤵
- Launches sc.exe
PID:2784
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2640
-
-
C:\Windows\SysWOW64\jwwlxfqx\pnxyawzf.exeC:\Windows\SysWOW64\jwwlxfqx\pnxyawzf.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5dbf6d106f340daa6cd2d87793da45680
SHA15135a2234107a42406205fb0acb1d9ffb347b15d
SHA2563fea56d4baac407b86e3d591e43195799a857a67ec63626fa8472b2b242b7b9b
SHA512e9975252eb7e9edc30276ba0cf3f98262ccc7967d441045d254e0ab06f3c8cc069bcf06ddf9c500112d37122cd5e249ad8ed9423343584e4b4c24a4d98fcfe5f
-
Filesize
13.0MB
MD5dbf6d106f340daa6cd2d87793da45680
SHA15135a2234107a42406205fb0acb1d9ffb347b15d
SHA2563fea56d4baac407b86e3d591e43195799a857a67ec63626fa8472b2b242b7b9b
SHA512e9975252eb7e9edc30276ba0cf3f98262ccc7967d441045d254e0ab06f3c8cc069bcf06ddf9c500112d37122cd5e249ad8ed9423343584e4b4c24a4d98fcfe5f