Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
0807543971e18ff126a7d0005b5e677e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0807543971e18ff126a7d0005b5e677e.exe
Resource
win10v2004-20231215-en
General
-
Target
0807543971e18ff126a7d0005b5e677e.exe
-
Size
13.5MB
-
MD5
0807543971e18ff126a7d0005b5e677e
-
SHA1
0fc94ea9321da3d9b44d15f1a34066ec87a2b04f
-
SHA256
c2b497b796bd3e02cf5fd162ca2bf225846f1312bbdfdb8e01486bc9b41c88f3
-
SHA512
978b1c6ef843124841341d2fee8d910d57fb314db97da24e1db74f9e2c431945d1d84091899b5f353eb51df694fb1e6ef05264a140a0665b56ccb039bc8cce29
-
SSDEEP
6144:paMudoalz7/PDt9m2O0TAxhlJlHWmuPoVd4/VVtytytytytytytytytytytytyt/:nudoSjt9m2cTlXHWmugIV
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2544 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2044 sc.exe 2648 sc.exe 2692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2272 2884 0807543971e18ff126a7d0005b5e677e.exe 23 PID 2884 wrote to memory of 2272 2884 0807543971e18ff126a7d0005b5e677e.exe 23 PID 2884 wrote to memory of 2272 2884 0807543971e18ff126a7d0005b5e677e.exe 23 PID 2884 wrote to memory of 2272 2884 0807543971e18ff126a7d0005b5e677e.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\0807543971e18ff126a7d0005b5e677e.exe"C:\Users\Admin\AppData\Local\Temp\0807543971e18ff126a7d0005b5e677e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\awgegzwp\2⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\asxxewqu.exe" C:\Windows\SysWOW64\awgegzwp\2⤵PID:2196
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create awgegzwp binPath= "C:\Windows\SysWOW64\awgegzwp\asxxewqu.exe /d\"C:\Users\Admin\AppData\Local\Temp\0807543971e18ff126a7d0005b5e677e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2044
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description awgegzwp "wifi internet conection"2⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start awgegzwp2⤵
- Launches sc.exe
PID:2692
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2544
-
-
C:\Windows\SysWOW64\awgegzwp\asxxewqu.exeC:\Windows\SysWOW64\awgegzwp\asxxewqu.exe /d"C:\Users\Admin\AppData\Local\Temp\0807543971e18ff126a7d0005b5e677e.exe"1⤵PID:2600
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51de93dec12f5d3422e101152ee833006
SHA1d3376263f484f49685a1c207fddb1004dddf943a
SHA25626ba110d94de780615e7dbb007168c4f388a866fdc7f1aa0a0250ec9d929f51c
SHA512dd38be3b292d2231dfb78380c0af5710e6b7563e1a1173753a6608482ab153c04cdc2aab9e0ed526b49139dfffef7e72ebff7ec6de07b1664944bcf177b61b72