Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
64e0106d66252e95c241e9dc3fe33f12.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64e0106d66252e95c241e9dc3fe33f12.exe
Resource
win10v2004-20231215-en
General
-
Target
64e0106d66252e95c241e9dc3fe33f12.exe
-
Size
12.7MB
-
MD5
64e0106d66252e95c241e9dc3fe33f12
-
SHA1
f9b82c5dbb25a39dae282034c429a1b10bd6ae17
-
SHA256
56b2d27c6d6f98a4cded2c47abe56f5c1e2cb1ed37acdff5be6c88d3e8b8f284
-
SHA512
f1b2eeefd4e73fa27adeb4a768226a834f1b871b37d404eb2540d9fac5888b70f29c7231646a5ac5e56434792e172a42c06f566a5c8572109fac314a3771bcf8
-
SSDEEP
393216:I6EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE:7EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEn
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\mqglnzdb = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2984 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\mqglnzdb\ImagePath = "C:\\Windows\\SysWOW64\\mqglnzdb\\kfpsgrrz.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2668 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 kfpsgrrz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2668 2088 kfpsgrrz.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2772 sc.exe 3040 sc.exe 2364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1236 2480 64e0106d66252e95c241e9dc3fe33f12.exe 28 PID 2480 wrote to memory of 1236 2480 64e0106d66252e95c241e9dc3fe33f12.exe 28 PID 2480 wrote to memory of 1236 2480 64e0106d66252e95c241e9dc3fe33f12.exe 28 PID 2480 wrote to memory of 1236 2480 64e0106d66252e95c241e9dc3fe33f12.exe 28 PID 2480 wrote to memory of 2004 2480 64e0106d66252e95c241e9dc3fe33f12.exe 31 PID 2480 wrote to memory of 2004 2480 64e0106d66252e95c241e9dc3fe33f12.exe 31 PID 2480 wrote to memory of 2004 2480 64e0106d66252e95c241e9dc3fe33f12.exe 31 PID 2480 wrote to memory of 2004 2480 64e0106d66252e95c241e9dc3fe33f12.exe 31 PID 2480 wrote to memory of 2772 2480 64e0106d66252e95c241e9dc3fe33f12.exe 32 PID 2480 wrote to memory of 2772 2480 64e0106d66252e95c241e9dc3fe33f12.exe 32 PID 2480 wrote to memory of 2772 2480 64e0106d66252e95c241e9dc3fe33f12.exe 32 PID 2480 wrote to memory of 2772 2480 64e0106d66252e95c241e9dc3fe33f12.exe 32 PID 2480 wrote to memory of 3040 2480 64e0106d66252e95c241e9dc3fe33f12.exe 35 PID 2480 wrote to memory of 3040 2480 64e0106d66252e95c241e9dc3fe33f12.exe 35 PID 2480 wrote to memory of 3040 2480 64e0106d66252e95c241e9dc3fe33f12.exe 35 PID 2480 wrote to memory of 3040 2480 64e0106d66252e95c241e9dc3fe33f12.exe 35 PID 2480 wrote to memory of 2364 2480 64e0106d66252e95c241e9dc3fe33f12.exe 36 PID 2480 wrote to memory of 2364 2480 64e0106d66252e95c241e9dc3fe33f12.exe 36 PID 2480 wrote to memory of 2364 2480 64e0106d66252e95c241e9dc3fe33f12.exe 36 PID 2480 wrote to memory of 2364 2480 64e0106d66252e95c241e9dc3fe33f12.exe 36 PID 2480 wrote to memory of 2984 2480 64e0106d66252e95c241e9dc3fe33f12.exe 39 PID 2480 wrote to memory of 2984 2480 64e0106d66252e95c241e9dc3fe33f12.exe 39 PID 2480 wrote to memory of 2984 2480 64e0106d66252e95c241e9dc3fe33f12.exe 39 PID 2480 wrote to memory of 2984 2480 64e0106d66252e95c241e9dc3fe33f12.exe 39 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41 PID 2088 wrote to memory of 2668 2088 kfpsgrrz.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e0106d66252e95c241e9dc3fe33f12.exe"C:\Users\Admin\AppData\Local\Temp\64e0106d66252e95c241e9dc3fe33f12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\mqglnzdb\2⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kfpsgrrz.exe" C:\Windows\SysWOW64\mqglnzdb\2⤵PID:2004
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create mqglnzdb binPath= "C:\Windows\SysWOW64\mqglnzdb\kfpsgrrz.exe /d\"C:\Users\Admin\AppData\Local\Temp\64e0106d66252e95c241e9dc3fe33f12.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description mqglnzdb "wifi internet conection"2⤵
- Launches sc.exe
PID:3040
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start mqglnzdb2⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2984
-
-
C:\Windows\SysWOW64\mqglnzdb\kfpsgrrz.exeC:\Windows\SysWOW64\mqglnzdb\kfpsgrrz.exe /d"C:\Users\Admin\AppData\Local\Temp\64e0106d66252e95c241e9dc3fe33f12.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5018e2964f03dfef7be5abae440a6780b
SHA108a7822b43e7ec3da782694872623638ed7b444b
SHA256578a766625e79d33482604442c48965d2b2d5c6325edb7124b32c553de05418a
SHA512915914a46bfff66cfeb39c9826f823a9b3007c130b49af9cbdba92d7c8ba02fee749c906f34a030197267ebd9e5b4696678e3dea73123471ae7d3713279760db
-
Filesize
640KB
MD53153c3433aae4efcd023a85d0d8005ff
SHA168515ad87b41f9bceb2d8075172296ecc24d03d5
SHA256810fc21789bb615d152be0ca6874c248e8ee0bcd4869b2e1b342e11d36269db9
SHA5125136da07771466cf93475de9ad31c1f5f8e151d1981486099673c96475ad1c00cb5d9b3a6fe339f30b3b354fcb914c91bea65a7050d415cdab1b534d221e3de6