Analysis
-
max time kernel
171s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:42
Static task
static1
Behavioral task
behavioral1
Sample
1a6060726c5693529f35ca4c0a90637e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a6060726c5693529f35ca4c0a90637e.exe
Resource
win10v2004-20231215-en
General
-
Target
1a6060726c5693529f35ca4c0a90637e.exe
-
Size
11.8MB
-
MD5
1a6060726c5693529f35ca4c0a90637e
-
SHA1
34d52fd089ae855f763caef6eb2a5a3e24092b0e
-
SHA256
02447f8d1ef4148ef09948fe2bdd57ed15e3b4f6fd86db9c4ef81004a43a0d6d
-
SHA512
d49ba36c91421a48f817a3704f2df101e8d646e981025425b776050fa4f9d7d42822ad3e5c3d5ebb701f3dd4a26f3cd78993f6840826484887400c4847449698
-
SSDEEP
6144:0KTDS3aiZOTXbKdags2FNxWUWF5zoINm/nu:hMaiZOT+dags21Wts9vu
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4556 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wtnyauer\ImagePath = "C:\\Windows\\SysWOW64\\wtnyauer\\bkwcmhdt.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1a6060726c5693529f35ca4c0a90637e.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 bkwcmhdt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 1736 1504 bkwcmhdt.exe 110 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4688 sc.exe 2332 sc.exe 4700 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2688 1504 WerFault.exe 108 3456 2496 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4404 2496 1a6060726c5693529f35ca4c0a90637e.exe 96 PID 2496 wrote to memory of 4404 2496 1a6060726c5693529f35ca4c0a90637e.exe 96 PID 2496 wrote to memory of 4404 2496 1a6060726c5693529f35ca4c0a90637e.exe 96 PID 2496 wrote to memory of 4520 2496 1a6060726c5693529f35ca4c0a90637e.exe 97 PID 2496 wrote to memory of 4520 2496 1a6060726c5693529f35ca4c0a90637e.exe 97 PID 2496 wrote to memory of 4520 2496 1a6060726c5693529f35ca4c0a90637e.exe 97 PID 2496 wrote to memory of 2332 2496 1a6060726c5693529f35ca4c0a90637e.exe 100 PID 2496 wrote to memory of 2332 2496 1a6060726c5693529f35ca4c0a90637e.exe 100 PID 2496 wrote to memory of 2332 2496 1a6060726c5693529f35ca4c0a90637e.exe 100 PID 2496 wrote to memory of 4700 2496 1a6060726c5693529f35ca4c0a90637e.exe 102 PID 2496 wrote to memory of 4700 2496 1a6060726c5693529f35ca4c0a90637e.exe 102 PID 2496 wrote to memory of 4700 2496 1a6060726c5693529f35ca4c0a90637e.exe 102 PID 2496 wrote to memory of 4688 2496 1a6060726c5693529f35ca4c0a90637e.exe 104 PID 2496 wrote to memory of 4688 2496 1a6060726c5693529f35ca4c0a90637e.exe 104 PID 2496 wrote to memory of 4688 2496 1a6060726c5693529f35ca4c0a90637e.exe 104 PID 2496 wrote to memory of 4556 2496 1a6060726c5693529f35ca4c0a90637e.exe 106 PID 2496 wrote to memory of 4556 2496 1a6060726c5693529f35ca4c0a90637e.exe 106 PID 2496 wrote to memory of 4556 2496 1a6060726c5693529f35ca4c0a90637e.exe 106 PID 1504 wrote to memory of 1736 1504 bkwcmhdt.exe 110 PID 1504 wrote to memory of 1736 1504 bkwcmhdt.exe 110 PID 1504 wrote to memory of 1736 1504 bkwcmhdt.exe 110 PID 1504 wrote to memory of 1736 1504 bkwcmhdt.exe 110 PID 1504 wrote to memory of 1736 1504 bkwcmhdt.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6060726c5693529f35ca4c0a90637e.exe"C:\Users\Admin\AppData\Local\Temp\1a6060726c5693529f35ca4c0a90637e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wtnyauer\2⤵PID:4404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bkwcmhdt.exe" C:\Windows\SysWOW64\wtnyauer\2⤵PID:4520
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wtnyauer binPath= "C:\Windows\SysWOW64\wtnyauer\bkwcmhdt.exe /d\"C:\Users\Admin\AppData\Local\Temp\1a6060726c5693529f35ca4c0a90637e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wtnyauer "wifi internet conection"2⤵
- Launches sc.exe
PID:4700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wtnyauer2⤵
- Launches sc.exe
PID:4688
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 11722⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\wtnyauer\bkwcmhdt.exeC:\Windows\SysWOW64\wtnyauer\bkwcmhdt.exe /d"C:\Users\Admin\AppData\Local\Temp\1a6060726c5693529f35ca4c0a90637e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 5362⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2496 -ip 24961⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1504 -ip 15041⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD5a88dd7cf0b6e3cc6a2639c8023c81bb3
SHA1cb086f1c1762aba5e9c5903c6cfdc6305d1f262d
SHA256aeb6604197ec9bf77a70140233882395f9485e37c71040909cc27e77f68fd72e
SHA512e1d45805eba4919c535e61a68bdba2529db23fc03596c59484062e2048462fb327cd716410deb32dd7fa20300987ae946471f7aee2de017f22a9a2db6e87cb68
-
Filesize
8.2MB
MD5c3919dd52e24add4836e266b405ea7af
SHA19410b77addc6827cc011f4929a573d6de3576854
SHA25605446b076a1d2bcb2f99283596e86520883f3277278ed8f2f08d3bc4627188aa
SHA5125ffc2ce203de28040df009b5c9206b59c22b4f4738deb34be2f87e9a4e9283497fc85713a4fc290404e804c4af89b5721c4bffddb2c50b3afb01c864c98b4f30