Analysis
-
max time kernel
23s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
4097178d42417041c6dfce21a0702db1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4097178d42417041c6dfce21a0702db1.exe
Resource
win10v2004-20231215-en
General
-
Target
4097178d42417041c6dfce21a0702db1.exe
-
Size
12.2MB
-
MD5
4097178d42417041c6dfce21a0702db1
-
SHA1
7c42b2d34f8a175c3d9dff286329e4e562f0c881
-
SHA256
30cda9b67432d82254db302482b46478ef00329dd6ebffde2433acfbb524fa21
-
SHA512
6effa7b8fb3e17cca13c0dcd162554e5c3df6640eb12ba4d3adbf8d909026a40ab5cdd369e393d08b5c06d0e4aebcdb550a22713c6961b30627a4b8eb178b7d6
-
SSDEEP
24576:AUqN67OT8888888888888888888888888888888888888888888888888888888P:AK7
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2640 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1520 fwwpfeft.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 2992 1520 fwwpfeft.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2696 sc.exe 2680 sc.exe 2092 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2832 2656 4097178d42417041c6dfce21a0702db1.exe 28 PID 2656 wrote to memory of 2832 2656 4097178d42417041c6dfce21a0702db1.exe 28 PID 2656 wrote to memory of 2832 2656 4097178d42417041c6dfce21a0702db1.exe 28 PID 2656 wrote to memory of 2832 2656 4097178d42417041c6dfce21a0702db1.exe 28 PID 2656 wrote to memory of 2820 2656 4097178d42417041c6dfce21a0702db1.exe 30 PID 2656 wrote to memory of 2820 2656 4097178d42417041c6dfce21a0702db1.exe 30 PID 2656 wrote to memory of 2820 2656 4097178d42417041c6dfce21a0702db1.exe 30 PID 2656 wrote to memory of 2820 2656 4097178d42417041c6dfce21a0702db1.exe 30 PID 2656 wrote to memory of 2696 2656 4097178d42417041c6dfce21a0702db1.exe 32 PID 2656 wrote to memory of 2696 2656 4097178d42417041c6dfce21a0702db1.exe 32 PID 2656 wrote to memory of 2696 2656 4097178d42417041c6dfce21a0702db1.exe 32 PID 2656 wrote to memory of 2696 2656 4097178d42417041c6dfce21a0702db1.exe 32 PID 2656 wrote to memory of 2680 2656 4097178d42417041c6dfce21a0702db1.exe 35 PID 2656 wrote to memory of 2680 2656 4097178d42417041c6dfce21a0702db1.exe 35 PID 2656 wrote to memory of 2680 2656 4097178d42417041c6dfce21a0702db1.exe 35 PID 2656 wrote to memory of 2680 2656 4097178d42417041c6dfce21a0702db1.exe 35 PID 2656 wrote to memory of 2092 2656 4097178d42417041c6dfce21a0702db1.exe 37 PID 2656 wrote to memory of 2092 2656 4097178d42417041c6dfce21a0702db1.exe 37 PID 2656 wrote to memory of 2092 2656 4097178d42417041c6dfce21a0702db1.exe 37 PID 2656 wrote to memory of 2092 2656 4097178d42417041c6dfce21a0702db1.exe 37 PID 2656 wrote to memory of 2640 2656 4097178d42417041c6dfce21a0702db1.exe 38 PID 2656 wrote to memory of 2640 2656 4097178d42417041c6dfce21a0702db1.exe 38 PID 2656 wrote to memory of 2640 2656 4097178d42417041c6dfce21a0702db1.exe 38 PID 2656 wrote to memory of 2640 2656 4097178d42417041c6dfce21a0702db1.exe 38 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41 PID 1520 wrote to memory of 2992 1520 fwwpfeft.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\4097178d42417041c6dfce21a0702db1.exe"C:\Users\Admin\AppData\Local\Temp\4097178d42417041c6dfce21a0702db1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\plkfifkh\2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fwwpfeft.exe" C:\Windows\SysWOW64\plkfifkh\2⤵PID:2820
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create plkfifkh binPath= "C:\Windows\SysWOW64\plkfifkh\fwwpfeft.exe /d\"C:\Users\Admin\AppData\Local\Temp\4097178d42417041c6dfce21a0702db1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description plkfifkh "wifi internet conection"2⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start plkfifkh2⤵
- Launches sc.exe
PID:2092
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2640
-
-
C:\Windows\SysWOW64\plkfifkh\fwwpfeft.exeC:\Windows\SysWOW64\plkfifkh\fwwpfeft.exe /d"C:\Users\Admin\AppData\Local\Temp\4097178d42417041c6dfce21a0702db1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651KB
MD5ba79a1f519ba0d0a20ca99f9748f1bc6
SHA19a56541963bda7a2eb49f2f39578e401e39e4aae
SHA25680ad1ca0c925cebcf1bb780f2b5afada4977294ef8b1eb5fed2fdc4842ce3505
SHA5129592480cff40d83b7dd352479be8824ef57bae626a470c41afb9080b5ca424d9a4955501d2f50344b26794d93496be46814d38a02a03a9ffe5bee481107f00ec
-
Filesize
92KB
MD59cffb9a3e7f5b756477460f195989d09
SHA149c3efb8abbf15607264c614c23c4d9fec7da514
SHA25661ad7d0b2b5c1102c8319d68c13b6ef9925497a5ff818752624bee42a8926b59
SHA51228ab3ef2c9c892ac83917d896c6c2171e404150ad29d8723655fca14d698ef046b18f739fb759e1ac093a8b597de80a871fc397159f153041034d677326482c8