Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 02:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
298KB
-
MD5
5182e126b6f798ddb20ac56c5ab4660d
-
SHA1
467a4e7708679aac87c2a4e98b9c69eba12dc21b
-
SHA256
d7b88f392653a4569f1f6a792d27ed75dcb22921915ff2cff23519d6eb8c673a
-
SHA512
37b25dc5c340817881922fc7b9fa4a06e1954cae86afee74d174c905e7be366edfe9329888bbcd46d3c8bae1d295c7dd13e0b78bc408d341b5d5d42c7301d4b8
-
SSDEEP
3072:w+uHkj3i/Gur0Z6sZgrKBRTM+4FvH9vxrFUkcVTcgpWvKV/Fy2L3:4Hci/GuoZ6pmBSJrJpUpV4gEY4
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2608 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ewbqqmlr\ImagePath = "C:\\Windows\\SysWOW64\\ewbqqmlr\\tiahmkph.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2512 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 tiahmkph.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 2512 2520 tiahmkph.exe 42 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2880 sc.exe 2884 sc.exe 2504 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1332 2184 file.exe 29 PID 2184 wrote to memory of 1332 2184 file.exe 29 PID 2184 wrote to memory of 1332 2184 file.exe 29 PID 2184 wrote to memory of 1332 2184 file.exe 29 PID 2184 wrote to memory of 2644 2184 file.exe 31 PID 2184 wrote to memory of 2644 2184 file.exe 31 PID 2184 wrote to memory of 2644 2184 file.exe 31 PID 2184 wrote to memory of 2644 2184 file.exe 31 PID 2184 wrote to memory of 2884 2184 file.exe 33 PID 2184 wrote to memory of 2884 2184 file.exe 33 PID 2184 wrote to memory of 2884 2184 file.exe 33 PID 2184 wrote to memory of 2884 2184 file.exe 33 PID 2184 wrote to memory of 2504 2184 file.exe 35 PID 2184 wrote to memory of 2504 2184 file.exe 35 PID 2184 wrote to memory of 2504 2184 file.exe 35 PID 2184 wrote to memory of 2504 2184 file.exe 35 PID 2184 wrote to memory of 2880 2184 file.exe 37 PID 2184 wrote to memory of 2880 2184 file.exe 37 PID 2184 wrote to memory of 2880 2184 file.exe 37 PID 2184 wrote to memory of 2880 2184 file.exe 37 PID 2184 wrote to memory of 2608 2184 file.exe 40 PID 2184 wrote to memory of 2608 2184 file.exe 40 PID 2184 wrote to memory of 2608 2184 file.exe 40 PID 2184 wrote to memory of 2608 2184 file.exe 40 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42 PID 2520 wrote to memory of 2512 2520 tiahmkph.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ewbqqmlr\2⤵PID:1332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tiahmkph.exe" C:\Windows\SysWOW64\ewbqqmlr\2⤵PID:2644
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ewbqqmlr binPath= "C:\Windows\SysWOW64\ewbqqmlr\tiahmkph.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ewbqqmlr "wifi internet conection"2⤵
- Launches sc.exe
PID:2504
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ewbqqmlr2⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2608
-
-
C:\Windows\SysWOW64\ewbqqmlr\tiahmkph.exeC:\Windows\SysWOW64\ewbqqmlr\tiahmkph.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.6MB
MD57a2348dcbcda6d78cadb59900c64e401
SHA116ff98dfe4ec4eccbd1ab49cf72c88a61fbaa036
SHA25674c1b7c197e47becdf0b3ac185c7e256c58d9ebb0de4ae33720b9947a292c7e8
SHA5123e0dbb4299bd2c2435813f5b58f1e75ed20c7b17e35c574ea53941ef1506e208b1e8281635a1d78b3ad8d229999c879b548f979489f1c35cc4a40563d7b5a57a
-
Filesize
11.6MB
MD57a2348dcbcda6d78cadb59900c64e401
SHA116ff98dfe4ec4eccbd1ab49cf72c88a61fbaa036
SHA25674c1b7c197e47becdf0b3ac185c7e256c58d9ebb0de4ae33720b9947a292c7e8
SHA5123e0dbb4299bd2c2435813f5b58f1e75ed20c7b17e35c574ea53941ef1506e208b1e8281635a1d78b3ad8d229999c879b548f979489f1c35cc4a40563d7b5a57a