Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
2308ed21c12b2b43e8e22d1e595ef5e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2308ed21c12b2b43e8e22d1e595ef5e7.exe
Resource
win10v2004-20231222-en
General
-
Target
2308ed21c12b2b43e8e22d1e595ef5e7.exe
-
Size
10.4MB
-
MD5
2308ed21c12b2b43e8e22d1e595ef5e7
-
SHA1
613d67ac63f1229c170412e0d39f6dcb46b5ca5b
-
SHA256
1dd9b91d9204e448403d82f29f1327979781e2b48e37825ba75d9f78e858d95a
-
SHA512
401ef803ec044fd1078d0893a926d5dcafd80cf54c7260bb79495b564a83aa8211d4dec2d76b6be1182616eab1db0373de826a6c939792e3fda93fe7e60934dc
-
SSDEEP
24576:slxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBT:slzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2252 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zkizwmkw\ImagePath = "C:\\Windows\\SysWOW64\\zkizwmkw\\cttmcbcq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2308ed21c12b2b43e8e22d1e595ef5e7.exe -
Deletes itself 1 IoCs
pid Process 60 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 cttmcbcq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3532 set thread context of 60 3532 cttmcbcq.exe 109 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4084 sc.exe 1380 sc.exe 4668 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2052 2008 WerFault.exe 89 2256 3532 WerFault.exe 103 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4524 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 94 PID 2008 wrote to memory of 4524 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 94 PID 2008 wrote to memory of 4524 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 94 PID 2008 wrote to memory of 2020 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 96 PID 2008 wrote to memory of 2020 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 96 PID 2008 wrote to memory of 2020 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 96 PID 2008 wrote to memory of 4084 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 97 PID 2008 wrote to memory of 4084 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 97 PID 2008 wrote to memory of 4084 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 97 PID 2008 wrote to memory of 1380 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 100 PID 2008 wrote to memory of 1380 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 100 PID 2008 wrote to memory of 1380 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 100 PID 2008 wrote to memory of 4668 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 101 PID 2008 wrote to memory of 4668 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 101 PID 2008 wrote to memory of 4668 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 101 PID 2008 wrote to memory of 2252 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 108 PID 2008 wrote to memory of 2252 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 108 PID 2008 wrote to memory of 2252 2008 2308ed21c12b2b43e8e22d1e595ef5e7.exe 108 PID 3532 wrote to memory of 60 3532 cttmcbcq.exe 109 PID 3532 wrote to memory of 60 3532 cttmcbcq.exe 109 PID 3532 wrote to memory of 60 3532 cttmcbcq.exe 109 PID 3532 wrote to memory of 60 3532 cttmcbcq.exe 109 PID 3532 wrote to memory of 60 3532 cttmcbcq.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zkizwmkw\2⤵PID:4524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cttmcbcq.exe" C:\Windows\SysWOW64\zkizwmkw\2⤵PID:2020
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zkizwmkw binPath= "C:\Windows\SysWOW64\zkizwmkw\cttmcbcq.exe /d\"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4084
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zkizwmkw "wifi internet conection"2⤵
- Launches sc.exe
PID:1380
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zkizwmkw2⤵
- Launches sc.exe
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 6722⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2252
-
-
C:\Windows\SysWOW64\zkizwmkw\cttmcbcq.exeC:\Windows\SysWOW64\zkizwmkw\cttmcbcq.exe /d"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 5322⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2008 -ip 20081⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3532 -ip 35321⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56e2fbe861dfa4d253b34a3b78d6c68f5
SHA15e5200651e962a90a7b552f82b15e488501c0de2
SHA2569828ccc3427eb3bc90c85647340a63535d20c1258ae955c976f92aee22ab5378
SHA512d19d1d7933fe849e18b2551fdb13e70528d5ce1df368c4982b316e8903cf3881879d07e35a08122de7fcf7e2d9f80d927a0c8117bf3afb0663733f3cf9aae08e
-
Filesize
1024KB
MD5aab2181a35e6cae6a99b56c536a963f7
SHA12376b4df3f6c553262f41d3b21572d22127a66dd
SHA25665edfb5b6be67578709bb7793a38c79ba03773ddb0029fe4fd90636dc68fd876
SHA512dc4783fe18a74fe0ada869686e111639c79e4de393b792f35325b70702f8cf3ecf00c0a96ae98e5ab16e66f32a5921416f50be7e4e218a09851f724e153fa049