Analysis
-
max time kernel
4s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:29
Static task
static1
Behavioral task
behavioral1
Sample
266901a548588b9f1b220e7b57831b0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
266901a548588b9f1b220e7b57831b0e.exe
Resource
win10v2004-20231222-en
General
-
Target
266901a548588b9f1b220e7b57831b0e.exe
-
Size
10.8MB
-
MD5
266901a548588b9f1b220e7b57831b0e
-
SHA1
215017a2f19f678d864db773349addc17de580b1
-
SHA256
7b7e8d4b97439bbb4b4e84f76abe0ab65b7952e6d77954f73ecc4aa8aaca0368
-
SHA512
56f823948da80600fa254bba936d86672f62efb5ed383e1c644878f93f054620f0c3a7cd3fcaeaf53dcfa0df3bea9ba0e7966214b504bcdc064d04327884882d
-
SSDEEP
98304:cbxPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:cb
Malware Config
Extracted
tofsee
176.111.174.19
defeatwax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1360 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 266901a548588b9f1b220e7b57831b0e.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 pvysjeid.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2272 sc.exe 1352 sc.exe 3152 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2764 3676 WerFault.exe 16 4724 2400 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3892 3676 266901a548588b9f1b220e7b57831b0e.exe 56 PID 3676 wrote to memory of 3892 3676 266901a548588b9f1b220e7b57831b0e.exe 56 PID 3676 wrote to memory of 3892 3676 266901a548588b9f1b220e7b57831b0e.exe 56 PID 3676 wrote to memory of 4980 3676 266901a548588b9f1b220e7b57831b0e.exe 67 PID 3676 wrote to memory of 4980 3676 266901a548588b9f1b220e7b57831b0e.exe 67 PID 3676 wrote to memory of 4980 3676 266901a548588b9f1b220e7b57831b0e.exe 67 PID 3676 wrote to memory of 2272 3676 266901a548588b9f1b220e7b57831b0e.exe 77 PID 3676 wrote to memory of 2272 3676 266901a548588b9f1b220e7b57831b0e.exe 77 PID 3676 wrote to memory of 2272 3676 266901a548588b9f1b220e7b57831b0e.exe 77 PID 3676 wrote to memory of 1352 3676 266901a548588b9f1b220e7b57831b0e.exe 89 PID 3676 wrote to memory of 1352 3676 266901a548588b9f1b220e7b57831b0e.exe 89 PID 3676 wrote to memory of 1352 3676 266901a548588b9f1b220e7b57831b0e.exe 89 PID 3676 wrote to memory of 3152 3676 266901a548588b9f1b220e7b57831b0e.exe 99 PID 3676 wrote to memory of 3152 3676 266901a548588b9f1b220e7b57831b0e.exe 99 PID 3676 wrote to memory of 3152 3676 266901a548588b9f1b220e7b57831b0e.exe 99 PID 3676 wrote to memory of 1360 3676 266901a548588b9f1b220e7b57831b0e.exe 105 PID 3676 wrote to memory of 1360 3676 266901a548588b9f1b220e7b57831b0e.exe 105 PID 3676 wrote to memory of 1360 3676 266901a548588b9f1b220e7b57831b0e.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\266901a548588b9f1b220e7b57831b0e.exe"C:\Users\Admin\AppData\Local\Temp\266901a548588b9f1b220e7b57831b0e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\husnmihe\2⤵PID:3892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pvysjeid.exe" C:\Windows\SysWOW64\husnmihe\2⤵PID:4980
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create husnmihe binPath= "C:\Windows\SysWOW64\husnmihe\pvysjeid.exe /d\"C:\Users\Admin\AppData\Local\Temp\266901a548588b9f1b220e7b57831b0e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description husnmihe "wifi internet conection"2⤵
- Launches sc.exe
PID:1352
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start husnmihe2⤵
- Launches sc.exe
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 5962⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1360
-
-
C:\Windows\SysWOW64\husnmihe\pvysjeid.exeC:\Windows\SysWOW64\husnmihe\pvysjeid.exe /d"C:\Users\Admin\AppData\Local\Temp\266901a548588b9f1b220e7b57831b0e.exe"1⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 3482⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3676 -ip 36761⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2400 -ip 24001⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5180d32e945464c18dbc9d1997e511e44
SHA1872ddad1e4f6deb4ad9c7ed604831aee0e3e0b02
SHA25693428056fc5357cd2f680749365429106054c31d49715d334676ad5e9b669594
SHA512202dc6ae526e9734ffa7990c8ac59ca1caba01cdad12e42eea04a8a3e1cf3035b2d7e40d0d2e48d59b5586aa1b9e7cc8246b44e49265f8adb88d7730f92ab33f