Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
0a6f8d6155ae1fd81f089e2f2459d79a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a6f8d6155ae1fd81f089e2f2459d79a.exe
Resource
win10v2004-20231215-en
General
-
Target
0a6f8d6155ae1fd81f089e2f2459d79a.exe
-
Size
10.5MB
-
MD5
0a6f8d6155ae1fd81f089e2f2459d79a
-
SHA1
9ed665dcff37925024f78a80001e88e230054146
-
SHA256
790ff7291e4267aeaffdd71ea6767353b0f46ee27dc9b1d287797d2f403b0715
-
SHA512
fa27d4bef6d28d06f326b236fd0f02679074c5fe8a24f7a796a79acfdf3a28fff91fd22dd7bd83e538813d67c4cf894f7114c41a8c384280943f8d77130f3646
-
SSDEEP
98304:xbxPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPn:xb
Malware Config
Extracted
tofsee
176.111.174.19
defeatwax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4916 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xosdbwxu\ImagePath = "C:\\Windows\\SysWOW64\\xosdbwxu\\seqnwud.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 0a6f8d6155ae1fd81f089e2f2459d79a.exe -
Deletes itself 1 IoCs
pid Process 3624 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 956 seqnwud.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 956 set thread context of 3624 956 seqnwud.exe 113 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3488 sc.exe 488 sc.exe 644 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4396 5004 WerFault.exe 87 5072 956 WerFault.exe 101 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4832 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 91 PID 5004 wrote to memory of 4832 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 91 PID 5004 wrote to memory of 4832 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 91 PID 5004 wrote to memory of 3712 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 93 PID 5004 wrote to memory of 3712 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 93 PID 5004 wrote to memory of 3712 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 93 PID 5004 wrote to memory of 3488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 96 PID 5004 wrote to memory of 3488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 96 PID 5004 wrote to memory of 3488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 96 PID 5004 wrote to memory of 488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 97 PID 5004 wrote to memory of 488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 97 PID 5004 wrote to memory of 488 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 97 PID 5004 wrote to memory of 644 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 99 PID 5004 wrote to memory of 644 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 99 PID 5004 wrote to memory of 644 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 99 PID 5004 wrote to memory of 4916 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 104 PID 5004 wrote to memory of 4916 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 104 PID 5004 wrote to memory of 4916 5004 0a6f8d6155ae1fd81f089e2f2459d79a.exe 104 PID 956 wrote to memory of 3624 956 seqnwud.exe 113 PID 956 wrote to memory of 3624 956 seqnwud.exe 113 PID 956 wrote to memory of 3624 956 seqnwud.exe 113 PID 956 wrote to memory of 3624 956 seqnwud.exe 113 PID 956 wrote to memory of 3624 956 seqnwud.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a6f8d6155ae1fd81f089e2f2459d79a.exe"C:\Users\Admin\AppData\Local\Temp\0a6f8d6155ae1fd81f089e2f2459d79a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\xosdbwxu\2⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\seqnwud.exe" C:\Windows\SysWOW64\xosdbwxu\2⤵PID:3712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create xosdbwxu binPath= "C:\Windows\SysWOW64\xosdbwxu\seqnwud.exe /d\"C:\Users\Admin\AppData\Local\Temp\0a6f8d6155ae1fd81f089e2f2459d79a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description xosdbwxu "wifi internet conection"2⤵
- Launches sc.exe
PID:488
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xosdbwxu2⤵
- Launches sc.exe
PID:644
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10362⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\xosdbwxu\seqnwud.exeC:\Windows\SysWOW64\xosdbwxu\seqnwud.exe /d"C:\Users\Admin\AppData\Local\Temp\0a6f8d6155ae1fd81f089e2f2459d79a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 5202⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5004 -ip 50041⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 956 -ip 9561⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5715f190dc0b4ca66cae54962ed74da6a
SHA10f17c5bfbeaecd34b254e0ce180b722f5667f96d
SHA256ad3354aee43893aacc7f496f3669c98ffdb20177bfa7ecd5f0be5ae0715f1838
SHA512436b9bed34616136c5508f18f38da883ec581366ec2068f05126e90d6ff2218954516675fd8f3a591605ebc1f39cf8bd3d3ca5e27c5094842980836696c5f753
-
Filesize
139KB
MD5cfee8257afc1bf8cfccb51df2bfef5c8
SHA114756db64effe1a30b8c22762ea4300405cd1a05
SHA256bd63124d50b7fc81d24a2bae2452c1d7daee3f9f1ff66d86a7c34ca472bb49f6
SHA512dff141068821771dba1f30ec58222586771168b0d45c8f525deee9166cd63f4f0ee830c4bfb716985f3d969ca28a8834e3d397898d5782aa7f0a73128adc400f