Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
2b84aab8b60102d44067f70578860110.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b84aab8b60102d44067f70578860110.exe
Resource
win10v2004-20231215-en
General
-
Target
2b84aab8b60102d44067f70578860110.exe
-
Size
11.8MB
-
MD5
2b84aab8b60102d44067f70578860110
-
SHA1
e09992036f447a9067081facbc955cc0cd8993d9
-
SHA256
5fb8fee2684b282fcaa3cef7f60ef934421f8f4e5c11ef08f3623df7d8e40669
-
SHA512
5c75c1b23fa5e87427f036a2cb885ba8423376236a08c1a5e3d5aad007a515a8bd42d8854de9eb13724b09b566ab865b865663613eeb0a3d5a4297d18c9acf6e
-
SSDEEP
24576:ElxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBl:ElzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\fcdbdnra = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2748 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fcdbdnra\ImagePath = "C:\\Windows\\SysWOW64\\fcdbdnra\\veqwgbxn.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2696 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 veqwgbxn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2696 2716 veqwgbxn.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2788 sc.exe 2060 sc.exe 2808 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2760 2540 2b84aab8b60102d44067f70578860110.exe 29 PID 2540 wrote to memory of 2760 2540 2b84aab8b60102d44067f70578860110.exe 29 PID 2540 wrote to memory of 2760 2540 2b84aab8b60102d44067f70578860110.exe 29 PID 2540 wrote to memory of 2760 2540 2b84aab8b60102d44067f70578860110.exe 29 PID 2540 wrote to memory of 2720 2540 2b84aab8b60102d44067f70578860110.exe 30 PID 2540 wrote to memory of 2720 2540 2b84aab8b60102d44067f70578860110.exe 30 PID 2540 wrote to memory of 2720 2540 2b84aab8b60102d44067f70578860110.exe 30 PID 2540 wrote to memory of 2720 2540 2b84aab8b60102d44067f70578860110.exe 30 PID 2540 wrote to memory of 2788 2540 2b84aab8b60102d44067f70578860110.exe 32 PID 2540 wrote to memory of 2788 2540 2b84aab8b60102d44067f70578860110.exe 32 PID 2540 wrote to memory of 2788 2540 2b84aab8b60102d44067f70578860110.exe 32 PID 2540 wrote to memory of 2788 2540 2b84aab8b60102d44067f70578860110.exe 32 PID 2540 wrote to memory of 2060 2540 2b84aab8b60102d44067f70578860110.exe 34 PID 2540 wrote to memory of 2060 2540 2b84aab8b60102d44067f70578860110.exe 34 PID 2540 wrote to memory of 2060 2540 2b84aab8b60102d44067f70578860110.exe 34 PID 2540 wrote to memory of 2060 2540 2b84aab8b60102d44067f70578860110.exe 34 PID 2540 wrote to memory of 2808 2540 2b84aab8b60102d44067f70578860110.exe 37 PID 2540 wrote to memory of 2808 2540 2b84aab8b60102d44067f70578860110.exe 37 PID 2540 wrote to memory of 2808 2540 2b84aab8b60102d44067f70578860110.exe 37 PID 2540 wrote to memory of 2808 2540 2b84aab8b60102d44067f70578860110.exe 37 PID 2540 wrote to memory of 2748 2540 2b84aab8b60102d44067f70578860110.exe 39 PID 2540 wrote to memory of 2748 2540 2b84aab8b60102d44067f70578860110.exe 39 PID 2540 wrote to memory of 2748 2540 2b84aab8b60102d44067f70578860110.exe 39 PID 2540 wrote to memory of 2748 2540 2b84aab8b60102d44067f70578860110.exe 39 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41 PID 2716 wrote to memory of 2696 2716 veqwgbxn.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b84aab8b60102d44067f70578860110.exe"C:\Users\Admin\AppData\Local\Temp\2b84aab8b60102d44067f70578860110.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fcdbdnra\2⤵PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\veqwgbxn.exe" C:\Windows\SysWOW64\fcdbdnra\2⤵PID:2720
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fcdbdnra binPath= "C:\Windows\SysWOW64\fcdbdnra\veqwgbxn.exe /d\"C:\Users\Admin\AppData\Local\Temp\2b84aab8b60102d44067f70578860110.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fcdbdnra "wifi internet conection"2⤵
- Launches sc.exe
PID:2060
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fcdbdnra2⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2748
-
-
C:\Windows\SysWOW64\fcdbdnra\veqwgbxn.exeC:\Windows\SysWOW64\fcdbdnra\veqwgbxn.exe /d"C:\Users\Admin\AppData\Local\Temp\2b84aab8b60102d44067f70578860110.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5e692fd8312efb0f63a17f8656846e7cf
SHA1dffcd127e43539fbf5e37e33825a26a00f5b9268
SHA2566e03013ca9d7f68c72411ae5a153eac293405895834ebfb0946e70d7a747d4a0
SHA5127fcad00ff28a5a75483ee6d0197afc70a6ccfc7c7319bdff946b6f0df7b8431b9443ddd6249886ed032c01134c5245b689b841232e975f0cef7e60fea8fa1caa
-
Filesize
184KB
MD5ebf21a433e4b2468975910a3ab0c5c05
SHA111cbdc07b00d9b08e9e0d92a62809b575b827186
SHA2564cefef8ee1edea5549ffff397b0e76c7dbf2320148f3b697cce27c77c79a2dba
SHA512e41ee4e445524faef197390735e869064fa683e768952613bae726dcb2b2e4a5720ef719be01010e4ecb6fb8033e464349b1da7387ecc14d42d12c80ca65a5ce