Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
3757421ea9ac7501daf8319fd8dfbad5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3757421ea9ac7501daf8319fd8dfbad5.exe
Resource
win10v2004-20231215-en
General
-
Target
3757421ea9ac7501daf8319fd8dfbad5.exe
-
Size
14.3MB
-
MD5
3757421ea9ac7501daf8319fd8dfbad5
-
SHA1
a20ee5932e9f907109e3aca3eecc8c031978ba71
-
SHA256
092573f07c86f7c1637cc647a266c59a5e6f1b23c4524832fe36fc406551bfe4
-
SHA512
18b7cc5b8828ada39a47248b93218ee8918304d94f52246f1ce19cb0cfbe7d31e5a50c2d98e0cb48cc02c41dc977f51935af04ae35a3321507cf6828efae42a5
-
SSDEEP
24576:okTlFKR1iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLX:oLi
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4440 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mjubvoaj\ImagePath = "C:\\Windows\\SysWOW64\\mjubvoaj\\lxeydjwe.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 3757421ea9ac7501daf8319fd8dfbad5.exe -
Deletes itself 1 IoCs
pid Process 4532 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 lxeydjwe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 4532 2224 lxeydjwe.exe 106 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3240 sc.exe 3480 sc.exe 1620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4376 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 93 PID 1704 wrote to memory of 4376 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 93 PID 1704 wrote to memory of 4376 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 93 PID 1704 wrote to memory of 3252 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 95 PID 1704 wrote to memory of 3252 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 95 PID 1704 wrote to memory of 3252 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 95 PID 1704 wrote to memory of 1620 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 97 PID 1704 wrote to memory of 1620 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 97 PID 1704 wrote to memory of 1620 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 97 PID 1704 wrote to memory of 3240 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 100 PID 1704 wrote to memory of 3240 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 100 PID 1704 wrote to memory of 3240 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 100 PID 1704 wrote to memory of 3480 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 102 PID 1704 wrote to memory of 3480 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 102 PID 1704 wrote to memory of 3480 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 102 PID 1704 wrote to memory of 4440 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 105 PID 1704 wrote to memory of 4440 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 105 PID 1704 wrote to memory of 4440 1704 3757421ea9ac7501daf8319fd8dfbad5.exe 105 PID 2224 wrote to memory of 4532 2224 lxeydjwe.exe 106 PID 2224 wrote to memory of 4532 2224 lxeydjwe.exe 106 PID 2224 wrote to memory of 4532 2224 lxeydjwe.exe 106 PID 2224 wrote to memory of 4532 2224 lxeydjwe.exe 106 PID 2224 wrote to memory of 4532 2224 lxeydjwe.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\3757421ea9ac7501daf8319fd8dfbad5.exe"C:\Users\Admin\AppData\Local\Temp\3757421ea9ac7501daf8319fd8dfbad5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\mjubvoaj\2⤵PID:4376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\lxeydjwe.exe" C:\Windows\SysWOW64\mjubvoaj\2⤵PID:3252
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create mjubvoaj binPath= "C:\Windows\SysWOW64\mjubvoaj\lxeydjwe.exe /d\"C:\Users\Admin\AppData\Local\Temp\3757421ea9ac7501daf8319fd8dfbad5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1620
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description mjubvoaj "wifi internet conection"2⤵
- Launches sc.exe
PID:3240
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start mjubvoaj2⤵
- Launches sc.exe
PID:3480
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4440
-
-
C:\Windows\SysWOW64\mjubvoaj\lxeydjwe.exeC:\Windows\SysWOW64\mjubvoaj\lxeydjwe.exe /d"C:\Users\Admin\AppData\Local\Temp\3757421ea9ac7501daf8319fd8dfbad5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5e031120850376c7f236e5e8ca5ebc886
SHA15eaca7ee9d7ce31d1ba206c2c1b278725f11fd78
SHA2562fc6c97f5cb7a11c6eaf92c8d7a7aaf4a3e3f91eab632d3b5538ac8754390d33
SHA51239b48475934de6e1de9ab6a7dc563c2e23a5ae1d8937161e7049b4752c9e41718c087ddf4883ea9674934862f9f2495b51f8fb32b408a581c1f3c4f99d9dd1b6
-
Filesize
978KB
MD5e6cf5d632de7b642a7bf453753fc699d
SHA123de268c1274e2c880c59daaa46464b2ea70044b
SHA256cdd020e42dc636186a9d34217287b602abf9b28f05f8923dfc2ee4806a411cc1
SHA512b189bf5b5bc96094bf181ea5c98796558f97298ff94805c113cd98a02670a7f76bb4f883297e1a3a0bd1d649e8ebd3d08ae410a1b37930fb2bce3475a62daced