Analysis
-
max time kernel
174s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe
Resource
win10v2004-20231215-en
General
-
Target
4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe
-
Size
14.7MB
-
MD5
4a9cf6d94bdbb5cc8a9aa649d881aa3f
-
SHA1
2264dfff92e60df1c88de176cb727b02cab2ead4
-
SHA256
d700078220b88dcc6ca5f6d644bda00b0f1c068375733f0cc861610b9de9ea00
-
SHA512
461591c323b9ac923654e4e05181efa85e13e53bdabf9355a7ad5fca91bb7d38a1c3e50d15006e043b39345760db77f1902c1ba21c14db867b7e1a587ea32be9
-
SSDEEP
393216:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr:pmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmr
Malware Config
Extracted
tofsee
194.61.3.129
defeatwax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4512 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nixuhgwi\ImagePath = "C:\\Windows\\SysWOW64\\nixuhgwi\\hltmflaz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe -
Deletes itself 1 IoCs
pid Process 544 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1840 hltmflaz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1840 set thread context of 544 1840 hltmflaz.exe 112 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3492 sc.exe 3220 sc.exe 2968 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1780 3224 WerFault.exe 87 4412 1840 WerFault.exe 107 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3952 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 93 PID 3224 wrote to memory of 3952 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 93 PID 3224 wrote to memory of 3952 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 93 PID 3224 wrote to memory of 3348 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 95 PID 3224 wrote to memory of 3348 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 95 PID 3224 wrote to memory of 3348 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 95 PID 3224 wrote to memory of 3492 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 97 PID 3224 wrote to memory of 3492 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 97 PID 3224 wrote to memory of 3492 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 97 PID 3224 wrote to memory of 3220 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 100 PID 3224 wrote to memory of 3220 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 100 PID 3224 wrote to memory of 3220 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 100 PID 3224 wrote to memory of 2968 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 102 PID 3224 wrote to memory of 2968 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 102 PID 3224 wrote to memory of 2968 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 102 PID 3224 wrote to memory of 4512 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 104 PID 3224 wrote to memory of 4512 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 104 PID 3224 wrote to memory of 4512 3224 4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe 104 PID 1840 wrote to memory of 544 1840 hltmflaz.exe 112 PID 1840 wrote to memory of 544 1840 hltmflaz.exe 112 PID 1840 wrote to memory of 544 1840 hltmflaz.exe 112 PID 1840 wrote to memory of 544 1840 hltmflaz.exe 112 PID 1840 wrote to memory of 544 1840 hltmflaz.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe"C:\Users\Admin\AppData\Local\Temp\4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nixuhgwi\2⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hltmflaz.exe" C:\Windows\SysWOW64\nixuhgwi\2⤵PID:3348
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nixuhgwi binPath= "C:\Windows\SysWOW64\nixuhgwi\hltmflaz.exe /d\"C:\Users\Admin\AppData\Local\Temp\4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3492
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nixuhgwi "wifi internet conection"2⤵
- Launches sc.exe
PID:3220
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nixuhgwi2⤵
- Launches sc.exe
PID:2968
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 10282⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\nixuhgwi\hltmflaz.exeC:\Windows\SysWOW64\nixuhgwi\hltmflaz.exe /d"C:\Users\Admin\AppData\Local\Temp\4a9cf6d94bdbb5cc8a9aa649d881aa3f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 5402⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3224 -ip 32241⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1840 -ip 18401⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD52659c1cb4bbb18add52d47a9f5e2e1e6
SHA17d21cf61dc95e32d37a8e7961f76fbe7317ea95e
SHA256af16995d7ceb2fbb504eaf140f3850d87c820496fc43dca212eae3b285123500
SHA5121ac0b2e5bccdd2971a18a446e1806807c2b9be71f8d032bb65ba6b83222b36ee294dbe11999ac3b8e1dcb1adead6df8590c0a140dbc263f3eefc8a8b82189545
-
Filesize
618KB
MD5c76709de1debdbfbaf8133ade36ecfa9
SHA1f402f07e62587ab7c2dcf2b668e07ea13e7a9d9d
SHA256ad7ee807772602aedf316817afa56387bae6531e8ba294d882c1ebcd84c41db7
SHA512ad249b84da8c6bb5e5ed05badc04536ca7a6b583455e9699702380c2475873e3e2f633adc5eeee98f94112d031a04b0a82844e152d5385e874d48808a6c7b1f9