Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
975b103bb2faa02e4368756b70c3ed53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
975b103bb2faa02e4368756b70c3ed53.exe
Resource
win10v2004-20231215-en
General
-
Target
975b103bb2faa02e4368756b70c3ed53.exe
-
Size
10.1MB
-
MD5
975b103bb2faa02e4368756b70c3ed53
-
SHA1
264da78af05d33710ae7132a91371dbbb1726a03
-
SHA256
245e3a7893140eb584a482391e4bf44031e0aa882b5283ddb1cee3a6bea831fb
-
SHA512
a6bbd13ea2c8d5c86196420e65d1ae9dbeb74e9f9735ffe1f4c90f48a4f09fd6e9880fdba36ff7b968c39f5f0714ebe26dd20759885cc11af77e361cc8653fe1
-
SSDEEP
196608:E888888888888888888888888888888888888888888888888888888888888888:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3020 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jpkktymc\ImagePath = "C:\\Windows\\SysWOW64\\jpkktymc\\ovywxxnb.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 975b103bb2faa02e4368756b70c3ed53.exe -
Deletes itself 1 IoCs
pid Process 2216 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 ovywxxnb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 2216 3172 ovywxxnb.exe 112 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4448 sc.exe 4616 sc.exe 4392 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4988 4000 WerFault.exe 89 2672 3172 WerFault.exe 104 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4000 wrote to memory of 5008 4000 975b103bb2faa02e4368756b70c3ed53.exe 93 PID 4000 wrote to memory of 5008 4000 975b103bb2faa02e4368756b70c3ed53.exe 93 PID 4000 wrote to memory of 5008 4000 975b103bb2faa02e4368756b70c3ed53.exe 93 PID 4000 wrote to memory of 4520 4000 975b103bb2faa02e4368756b70c3ed53.exe 96 PID 4000 wrote to memory of 4520 4000 975b103bb2faa02e4368756b70c3ed53.exe 96 PID 4000 wrote to memory of 4520 4000 975b103bb2faa02e4368756b70c3ed53.exe 96 PID 4000 wrote to memory of 4392 4000 975b103bb2faa02e4368756b70c3ed53.exe 97 PID 4000 wrote to memory of 4392 4000 975b103bb2faa02e4368756b70c3ed53.exe 97 PID 4000 wrote to memory of 4392 4000 975b103bb2faa02e4368756b70c3ed53.exe 97 PID 4000 wrote to memory of 4448 4000 975b103bb2faa02e4368756b70c3ed53.exe 100 PID 4000 wrote to memory of 4448 4000 975b103bb2faa02e4368756b70c3ed53.exe 100 PID 4000 wrote to memory of 4448 4000 975b103bb2faa02e4368756b70c3ed53.exe 100 PID 4000 wrote to memory of 4616 4000 975b103bb2faa02e4368756b70c3ed53.exe 103 PID 4000 wrote to memory of 4616 4000 975b103bb2faa02e4368756b70c3ed53.exe 103 PID 4000 wrote to memory of 4616 4000 975b103bb2faa02e4368756b70c3ed53.exe 103 PID 3172 wrote to memory of 2216 3172 ovywxxnb.exe 112 PID 3172 wrote to memory of 2216 3172 ovywxxnb.exe 112 PID 3172 wrote to memory of 2216 3172 ovywxxnb.exe 112 PID 3172 wrote to memory of 2216 3172 ovywxxnb.exe 112 PID 3172 wrote to memory of 2216 3172 ovywxxnb.exe 112 PID 4000 wrote to memory of 3020 4000 975b103bb2faa02e4368756b70c3ed53.exe 111 PID 4000 wrote to memory of 3020 4000 975b103bb2faa02e4368756b70c3ed53.exe 111 PID 4000 wrote to memory of 3020 4000 975b103bb2faa02e4368756b70c3ed53.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\975b103bb2faa02e4368756b70c3ed53.exe"C:\Users\Admin\AppData\Local\Temp\975b103bb2faa02e4368756b70c3ed53.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jpkktymc\2⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ovywxxnb.exe" C:\Windows\SysWOW64\jpkktymc\2⤵PID:4520
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jpkktymc binPath= "C:\Windows\SysWOW64\jpkktymc\ovywxxnb.exe /d\"C:\Users\Admin\AppData\Local\Temp\975b103bb2faa02e4368756b70c3ed53.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4392
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jpkktymc "wifi internet conection"2⤵
- Launches sc.exe
PID:4448
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jpkktymc2⤵
- Launches sc.exe
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 5962⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3020
-
-
C:\Windows\SysWOW64\jpkktymc\ovywxxnb.exeC:\Windows\SysWOW64\jpkktymc\ovywxxnb.exe /d"C:\Users\Admin\AppData\Local\Temp\975b103bb2faa02e4368756b70c3ed53.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 5122⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3172 -ip 31721⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4000 -ip 40001⤵PID:316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58d2405548872f26e5085bd83f0750666
SHA1d94539133296e6bc015100ebe0fdb1ff6e95ca09
SHA25605a6bb26d7f75b8cff6f558cf9e882f46256a807731a8a591cc8e09c15a2d4dc
SHA51230ccb13b50e440e2e420a0f4f59738e72bc9558241c316ca37541ea754174535a58fcc0a558749b4e12b4c3c628544349bf1a1e82ffcc1cb6cf31e6499c01f17
-
Filesize
316KB
MD5fc52440294717ebbc704704ac7c30b3c
SHA193e69c2a7ab9970459071e975ef9e3c2229c192d
SHA256512d012b751beeba2491c660bdcecf13df4593926ae01585777bde97c96af5d3
SHA5120e90c616f8da75275aa2e6b7149465e5a06bb56d20478dd4574a2a3a25762189570c22de08c929394c27d507f6df422171753ec61a14e1b5408c10845780336e