Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
598c4c5cc7d092aa5582b8a34777e53a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
598c4c5cc7d092aa5582b8a34777e53a.exe
Resource
win10v2004-20231215-en
General
-
Target
598c4c5cc7d092aa5582b8a34777e53a.exe
-
Size
10.2MB
-
MD5
598c4c5cc7d092aa5582b8a34777e53a
-
SHA1
492cb28919b5ccdbac6f690061ead4e289bc1238
-
SHA256
c78cbeb30a5a688753dbc1bace6590378310bb7589a40b5cfcdca98bba463496
-
SHA512
39d0d8fbb640044567266a56e90ec7afc22f0c917d7900706c7743145ad19098a15f8012c24c3329f0ffeb289363b38cda577f035ce32f90aaa70b7db8b7efde
-
SSDEEP
24576:10PvTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT:1
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2160 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vqmlmafj\ImagePath = "C:\\Windows\\SysWOW64\\vqmlmafj\\cgnrtwmy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 598c4c5cc7d092aa5582b8a34777e53a.exe -
Deletes itself 1 IoCs
pid Process 4420 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4816 cgnrtwmy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4816 set thread context of 4420 4816 cgnrtwmy.exe 115 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5056 sc.exe 3324 sc.exe 376 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3536 5048 WerFault.exe 87 2600 4816 WerFault.exe 107 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2196 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 96 PID 5048 wrote to memory of 2196 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 96 PID 5048 wrote to memory of 2196 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 96 PID 5048 wrote to memory of 4384 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 100 PID 5048 wrote to memory of 4384 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 100 PID 5048 wrote to memory of 4384 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 100 PID 5048 wrote to memory of 5056 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 101 PID 5048 wrote to memory of 5056 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 101 PID 5048 wrote to memory of 5056 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 101 PID 5048 wrote to memory of 3324 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 103 PID 5048 wrote to memory of 3324 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 103 PID 5048 wrote to memory of 3324 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 103 PID 5048 wrote to memory of 376 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 105 PID 5048 wrote to memory of 376 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 105 PID 5048 wrote to memory of 376 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 105 PID 5048 wrote to memory of 2160 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 110 PID 5048 wrote to memory of 2160 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 110 PID 5048 wrote to memory of 2160 5048 598c4c5cc7d092aa5582b8a34777e53a.exe 110 PID 4816 wrote to memory of 4420 4816 cgnrtwmy.exe 115 PID 4816 wrote to memory of 4420 4816 cgnrtwmy.exe 115 PID 4816 wrote to memory of 4420 4816 cgnrtwmy.exe 115 PID 4816 wrote to memory of 4420 4816 cgnrtwmy.exe 115 PID 4816 wrote to memory of 4420 4816 cgnrtwmy.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\598c4c5cc7d092aa5582b8a34777e53a.exe"C:\Users\Admin\AppData\Local\Temp\598c4c5cc7d092aa5582b8a34777e53a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vqmlmafj\2⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cgnrtwmy.exe" C:\Windows\SysWOW64\vqmlmafj\2⤵PID:4384
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vqmlmafj binPath= "C:\Windows\SysWOW64\vqmlmafj\cgnrtwmy.exe /d\"C:\Users\Admin\AppData\Local\Temp\598c4c5cc7d092aa5582b8a34777e53a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:5056
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vqmlmafj "wifi internet conection"2⤵
- Launches sc.exe
PID:3324
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vqmlmafj2⤵
- Launches sc.exe
PID:376
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 11802⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\vqmlmafj\cgnrtwmy.exeC:\Windows\SysWOW64\vqmlmafj\cgnrtwmy.exe /d"C:\Users\Admin\AppData\Local\Temp\598c4c5cc7d092aa5582b8a34777e53a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 5202⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5048 -ip 50481⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4816 -ip 48161⤵PID:672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD50b1c48210258d9e916889149224aba61
SHA165afb2cc6df7544d4eb3913edf216701a5415036
SHA256c876be60b1672ce705c22384245ffe1a51b34a51fe56fa309776a9462701dbab
SHA5121d4425966549ccd84496936db353ef5fc09f399bce8374a469031dca5b251c233fc2d4827120c4918759195b7bc463108d99ff15edc4cd2b978b0641675d6913
-
Filesize
1KB
MD5b04459318dcbd58657897aa4da45555d
SHA1dcff52760c7dc3e17259ad148682bac18f8a0845
SHA256add557e201744551aef99e03425d0cf50b919c08f9645dfc8924a7795ea1bd64
SHA512bc4c331bf2a160a8296245a90edf2f1e565b9bd4ec4191a6736276383d91bbc50a742e43f62789c761df5324c82c333f217f4ab2cd4327fe2b7f6b4d2f880db1