Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
384a8eb7269c716f2e2ffa94cd9cb5cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
384a8eb7269c716f2e2ffa94cd9cb5cd.exe
Resource
win10v2004-20231215-en
General
-
Target
384a8eb7269c716f2e2ffa94cd9cb5cd.exe
-
Size
13.0MB
-
MD5
384a8eb7269c716f2e2ffa94cd9cb5cd
-
SHA1
6ef3965faa5857bfadca2162a8ec5febaba13894
-
SHA256
160d6da72d6c8babe18edbcec0072e3e770133330773c065788e747f6fb94e3a
-
SHA512
425f8b7da1e7f7d689280852c720d52efb0672827b845bbf132cbe44f531cbc35f96bdc1ae418d1cdee7bc3f37bf7bca2142aeaf38bfa1c30ada9822f01a5baf
-
SSDEEP
24576:alxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBh:alzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4064 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vgfuhhhs\ImagePath = "C:\\Windows\\SysWOW64\\vgfuhhhs\\llidgxog.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 384a8eb7269c716f2e2ffa94cd9cb5cd.exe -
Deletes itself 1 IoCs
pid Process 1552 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4628 llidgxog.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4628 set thread context of 1552 4628 llidgxog.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4636 sc.exe 2020 sc.exe 872 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3612 3100 WerFault.exe 18 1728 4628 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4300 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 44 PID 3100 wrote to memory of 4300 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 44 PID 3100 wrote to memory of 4300 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 44 PID 3100 wrote to memory of 2692 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 54 PID 3100 wrote to memory of 2692 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 54 PID 3100 wrote to memory of 2692 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 54 PID 3100 wrote to memory of 4636 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 64 PID 3100 wrote to memory of 4636 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 64 PID 3100 wrote to memory of 4636 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 64 PID 3100 wrote to memory of 2020 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 74 PID 3100 wrote to memory of 2020 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 74 PID 3100 wrote to memory of 2020 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 74 PID 3100 wrote to memory of 872 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 84 PID 3100 wrote to memory of 872 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 84 PID 3100 wrote to memory of 872 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 84 PID 3100 wrote to memory of 4064 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 97 PID 3100 wrote to memory of 4064 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 97 PID 3100 wrote to memory of 4064 3100 384a8eb7269c716f2e2ffa94cd9cb5cd.exe 97 PID 4628 wrote to memory of 1552 4628 llidgxog.exe 103 PID 4628 wrote to memory of 1552 4628 llidgxog.exe 103 PID 4628 wrote to memory of 1552 4628 llidgxog.exe 103 PID 4628 wrote to memory of 1552 4628 llidgxog.exe 103 PID 4628 wrote to memory of 1552 4628 llidgxog.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\384a8eb7269c716f2e2ffa94cd9cb5cd.exe"C:\Users\Admin\AppData\Local\Temp\384a8eb7269c716f2e2ffa94cd9cb5cd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vgfuhhhs\2⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\llidgxog.exe" C:\Windows\SysWOW64\vgfuhhhs\2⤵PID:2692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vgfuhhhs binPath= "C:\Windows\SysWOW64\vgfuhhhs\llidgxog.exe /d\"C:\Users\Admin\AppData\Local\Temp\384a8eb7269c716f2e2ffa94cd9cb5cd.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4636
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vgfuhhhs "wifi internet conection"2⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vgfuhhhs2⤵
- Launches sc.exe
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 12122⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4064
-
-
C:\Windows\SysWOW64\vgfuhhhs\llidgxog.exeC:\Windows\SysWOW64\vgfuhhhs\llidgxog.exe /d"C:\Users\Admin\AppData\Local\Temp\384a8eb7269c716f2e2ffa94cd9cb5cd.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 5082⤵
- Program crash
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3100 -ip 31001⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4628 -ip 46281⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2