Analysis
-
max time kernel
173s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:42
Static task
static1
Behavioral task
behavioral1
Sample
05ef9769c64b9e886e5278e450587dd4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05ef9769c64b9e886e5278e450587dd4.exe
Resource
win10v2004-20231215-en
General
-
Target
05ef9769c64b9e886e5278e450587dd4.exe
-
Size
13.9MB
-
MD5
05ef9769c64b9e886e5278e450587dd4
-
SHA1
c8dd39cf2725f1f4e778f1a3f40bbc54c12a072f
-
SHA256
aa04b3d9d58fd65c35da8d55a4ef05bf0fc33b1f349826fcae0c7c6b4ad0415a
-
SHA512
f7888b592715c1293195ae5a60d4206055cc1c96731f39d7e27b6ecc2609f9fd8884f5c890c6609cdfedde4fa32d04e9cc7b8e2885a1af3f617b7c3d81666279
-
SSDEEP
24576:yjDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBl:ynh
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3816 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\irhywxle\ImagePath = "C:\\Windows\\SysWOW64\\irhywxle\\qqjwifeg.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 05ef9769c64b9e886e5278e450587dd4.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 qqjwifeg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4756 set thread context of 5044 4756 qqjwifeg.exe 109 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3832 sc.exe 3456 sc.exe 4876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3444 3044 05ef9769c64b9e886e5278e450587dd4.exe 95 PID 3044 wrote to memory of 3444 3044 05ef9769c64b9e886e5278e450587dd4.exe 95 PID 3044 wrote to memory of 3444 3044 05ef9769c64b9e886e5278e450587dd4.exe 95 PID 3044 wrote to memory of 2080 3044 05ef9769c64b9e886e5278e450587dd4.exe 97 PID 3044 wrote to memory of 2080 3044 05ef9769c64b9e886e5278e450587dd4.exe 97 PID 3044 wrote to memory of 2080 3044 05ef9769c64b9e886e5278e450587dd4.exe 97 PID 3044 wrote to memory of 3832 3044 05ef9769c64b9e886e5278e450587dd4.exe 100 PID 3044 wrote to memory of 3832 3044 05ef9769c64b9e886e5278e450587dd4.exe 100 PID 3044 wrote to memory of 3832 3044 05ef9769c64b9e886e5278e450587dd4.exe 100 PID 3044 wrote to memory of 3456 3044 05ef9769c64b9e886e5278e450587dd4.exe 102 PID 3044 wrote to memory of 3456 3044 05ef9769c64b9e886e5278e450587dd4.exe 102 PID 3044 wrote to memory of 3456 3044 05ef9769c64b9e886e5278e450587dd4.exe 102 PID 3044 wrote to memory of 4876 3044 05ef9769c64b9e886e5278e450587dd4.exe 104 PID 3044 wrote to memory of 4876 3044 05ef9769c64b9e886e5278e450587dd4.exe 104 PID 3044 wrote to memory of 4876 3044 05ef9769c64b9e886e5278e450587dd4.exe 104 PID 3044 wrote to memory of 3816 3044 05ef9769c64b9e886e5278e450587dd4.exe 106 PID 3044 wrote to memory of 3816 3044 05ef9769c64b9e886e5278e450587dd4.exe 106 PID 3044 wrote to memory of 3816 3044 05ef9769c64b9e886e5278e450587dd4.exe 106 PID 4756 wrote to memory of 5044 4756 qqjwifeg.exe 109 PID 4756 wrote to memory of 5044 4756 qqjwifeg.exe 109 PID 4756 wrote to memory of 5044 4756 qqjwifeg.exe 109 PID 4756 wrote to memory of 5044 4756 qqjwifeg.exe 109 PID 4756 wrote to memory of 5044 4756 qqjwifeg.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\05ef9769c64b9e886e5278e450587dd4.exe"C:\Users\Admin\AppData\Local\Temp\05ef9769c64b9e886e5278e450587dd4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\irhywxle\2⤵PID:3444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qqjwifeg.exe" C:\Windows\SysWOW64\irhywxle\2⤵PID:2080
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create irhywxle binPath= "C:\Windows\SysWOW64\irhywxle\qqjwifeg.exe /d\"C:\Users\Admin\AppData\Local\Temp\05ef9769c64b9e886e5278e450587dd4.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3832
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description irhywxle "wifi internet conection"2⤵
- Launches sc.exe
PID:3456
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start irhywxle2⤵
- Launches sc.exe
PID:4876
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3816
-
-
C:\Windows\SysWOW64\irhywxle\qqjwifeg.exeC:\Windows\SysWOW64\irhywxle\qqjwifeg.exe /d"C:\Users\Admin\AppData\Local\Temp\05ef9769c64b9e886e5278e450587dd4.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:5044
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.8MB
MD5ce8b94f5067e0af62b61668de0b27a78
SHA1ad4cdcb763bf122c56a5258b28904672aecc0b53
SHA25660a70f9f16cc47bb960e0872577bd998a241dcaf7950ee959c180ad25e5d93b9
SHA5125fd0cec33ba0a38676791e81f293acc49c85a2ea57ff95ceeb8b2a7460a8fe77ff3c1c1c1338e38e54aac5606daed607dac22c02ef11e2c16f52b6e3260348a8