Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 05:13
Static task
static1
Behavioral task
behavioral1
Sample
570cb3c8f1b4128dccabb856d58cce88.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
570cb3c8f1b4128dccabb856d58cce88.exe
Resource
win10v2004-20231222-en
General
-
Target
570cb3c8f1b4128dccabb856d58cce88.exe
-
Size
13.7MB
-
MD5
570cb3c8f1b4128dccabb856d58cce88
-
SHA1
13a367d5217658076dea133c23f77b38d72c7e7a
-
SHA256
ed12839b6d59af224c0160bb7431a252658952672b23436f0da75343ad30d9bb
-
SHA512
5ceb0ab5dda28c22dca372a537270ad386e52a7ffefba94f508141641e6c0abd73e45dd5387b1640de2575d6c11fa808cfcca2d27ae93cae75065e265fafde1d
-
SSDEEP
24576:kjDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBX:knh
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\caqmbkqp = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2580 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\caqmbkqp\ImagePath = "C:\\Windows\\SysWOW64\\caqmbkqp\\osvrdmjf.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1624 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 840 osvrdmjf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 840 set thread context of 1624 840 osvrdmjf.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2688 sc.exe 2812 sc.exe 2708 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2232 2460 570cb3c8f1b4128dccabb856d58cce88.exe 28 PID 2460 wrote to memory of 2232 2460 570cb3c8f1b4128dccabb856d58cce88.exe 28 PID 2460 wrote to memory of 2232 2460 570cb3c8f1b4128dccabb856d58cce88.exe 28 PID 2460 wrote to memory of 2232 2460 570cb3c8f1b4128dccabb856d58cce88.exe 28 PID 2460 wrote to memory of 2744 2460 570cb3c8f1b4128dccabb856d58cce88.exe 31 PID 2460 wrote to memory of 2744 2460 570cb3c8f1b4128dccabb856d58cce88.exe 31 PID 2460 wrote to memory of 2744 2460 570cb3c8f1b4128dccabb856d58cce88.exe 31 PID 2460 wrote to memory of 2744 2460 570cb3c8f1b4128dccabb856d58cce88.exe 31 PID 2460 wrote to memory of 2688 2460 570cb3c8f1b4128dccabb856d58cce88.exe 32 PID 2460 wrote to memory of 2688 2460 570cb3c8f1b4128dccabb856d58cce88.exe 32 PID 2460 wrote to memory of 2688 2460 570cb3c8f1b4128dccabb856d58cce88.exe 32 PID 2460 wrote to memory of 2688 2460 570cb3c8f1b4128dccabb856d58cce88.exe 32 PID 2460 wrote to memory of 2812 2460 570cb3c8f1b4128dccabb856d58cce88.exe 35 PID 2460 wrote to memory of 2812 2460 570cb3c8f1b4128dccabb856d58cce88.exe 35 PID 2460 wrote to memory of 2812 2460 570cb3c8f1b4128dccabb856d58cce88.exe 35 PID 2460 wrote to memory of 2812 2460 570cb3c8f1b4128dccabb856d58cce88.exe 35 PID 2460 wrote to memory of 2708 2460 570cb3c8f1b4128dccabb856d58cce88.exe 37 PID 2460 wrote to memory of 2708 2460 570cb3c8f1b4128dccabb856d58cce88.exe 37 PID 2460 wrote to memory of 2708 2460 570cb3c8f1b4128dccabb856d58cce88.exe 37 PID 2460 wrote to memory of 2708 2460 570cb3c8f1b4128dccabb856d58cce88.exe 37 PID 2460 wrote to memory of 2580 2460 570cb3c8f1b4128dccabb856d58cce88.exe 38 PID 2460 wrote to memory of 2580 2460 570cb3c8f1b4128dccabb856d58cce88.exe 38 PID 2460 wrote to memory of 2580 2460 570cb3c8f1b4128dccabb856d58cce88.exe 38 PID 2460 wrote to memory of 2580 2460 570cb3c8f1b4128dccabb856d58cce88.exe 38 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41 PID 840 wrote to memory of 1624 840 osvrdmjf.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\caqmbkqp\2⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\osvrdmjf.exe" C:\Windows\SysWOW64\caqmbkqp\2⤵PID:2744
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create caqmbkqp binPath= "C:\Windows\SysWOW64\caqmbkqp\osvrdmjf.exe /d\"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description caqmbkqp "wifi internet conection"2⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start caqmbkqp2⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2580
-
-
C:\Windows\SysWOW64\caqmbkqp\osvrdmjf.exeC:\Windows\SysWOW64\caqmbkqp\osvrdmjf.exe /d"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5cbf27a20cbb46dd51a503422610b8027
SHA156f41c7053b030fcea989784ddbbc840314c3344
SHA256d9c0e6a0f0d674b706248c634e247984da2f7f8dbcc289824f2a5cbf5f90c380
SHA512b0b8ad8ac232d2753508ccce0b6fc5b5a2c6982186fa1a4bdae005761e56b300a85c8182127e4d6d51a4aa2e36c3a1ff8eb5382a706ab21d28d6202a82989181
-
Filesize
159KB
MD5ef1d3b3698f257811bbfff79b4bd99ee
SHA1df10d181a50b4e70819a57b26ebc87022e9cf668
SHA256e7ad57fd13252dc4d392a304b94702d18d59f687d153730cb47aa60469a6081a
SHA512c3d0bb1d01114e72abb1b45667e79a553beb16fa4b29b4106960ffdfb68d31df9d12737f4b29e13996f45beb4a1629aebd2fdc691a9a29c6b90e2f47258346db