Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
74b207c88cf49d87489234697e01459a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74b207c88cf49d87489234697e01459a.exe
Resource
win10v2004-20231215-en
General
-
Target
74b207c88cf49d87489234697e01459a.exe
-
Size
14.8MB
-
MD5
74b207c88cf49d87489234697e01459a
-
SHA1
4b6aee7a8491f8af19baedab30e80198b4f4c395
-
SHA256
819e8ea3bf2c3bd94269febabb6aa64c54cf542306ae38c35ad79862a3b25fcd
-
SHA512
8b552b8e5724ebba31168c16759aea7035efc60b13eb203030aae6fc0adad1520ccf0da6371eabc2b61d96f646117c6699add6f6b1ea3247bf8e577443fbf554
-
SSDEEP
24576:ngdy5yNM4444444444444444444444444444444444444444444444444444444H:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5044 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\yjvduzf\ImagePath = "C:\\Windows\\SysWOW64\\yjvduzf\\pkzjotlj.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 74b207c88cf49d87489234697e01459a.exe -
Deletes itself 1 IoCs
pid Process 4200 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2556 pkzjotlj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 4200 2556 pkzjotlj.exe 108 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3660 sc.exe 3736 sc.exe 4048 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2996 1712 WerFault.exe 84 224 2556 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1712 wrote to memory of 948 1712 74b207c88cf49d87489234697e01459a.exe 88 PID 1712 wrote to memory of 948 1712 74b207c88cf49d87489234697e01459a.exe 88 PID 1712 wrote to memory of 948 1712 74b207c88cf49d87489234697e01459a.exe 88 PID 1712 wrote to memory of 2004 1712 74b207c88cf49d87489234697e01459a.exe 90 PID 1712 wrote to memory of 2004 1712 74b207c88cf49d87489234697e01459a.exe 90 PID 1712 wrote to memory of 2004 1712 74b207c88cf49d87489234697e01459a.exe 90 PID 1712 wrote to memory of 3660 1712 74b207c88cf49d87489234697e01459a.exe 92 PID 1712 wrote to memory of 3660 1712 74b207c88cf49d87489234697e01459a.exe 92 PID 1712 wrote to memory of 3660 1712 74b207c88cf49d87489234697e01459a.exe 92 PID 1712 wrote to memory of 3736 1712 74b207c88cf49d87489234697e01459a.exe 96 PID 1712 wrote to memory of 3736 1712 74b207c88cf49d87489234697e01459a.exe 96 PID 1712 wrote to memory of 3736 1712 74b207c88cf49d87489234697e01459a.exe 96 PID 1712 wrote to memory of 4048 1712 74b207c88cf49d87489234697e01459a.exe 99 PID 1712 wrote to memory of 4048 1712 74b207c88cf49d87489234697e01459a.exe 99 PID 1712 wrote to memory of 4048 1712 74b207c88cf49d87489234697e01459a.exe 99 PID 1712 wrote to memory of 5044 1712 74b207c88cf49d87489234697e01459a.exe 103 PID 1712 wrote to memory of 5044 1712 74b207c88cf49d87489234697e01459a.exe 103 PID 1712 wrote to memory of 5044 1712 74b207c88cf49d87489234697e01459a.exe 103 PID 2556 wrote to memory of 4200 2556 pkzjotlj.exe 108 PID 2556 wrote to memory of 4200 2556 pkzjotlj.exe 108 PID 2556 wrote to memory of 4200 2556 pkzjotlj.exe 108 PID 2556 wrote to memory of 4200 2556 pkzjotlj.exe 108 PID 2556 wrote to memory of 4200 2556 pkzjotlj.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe"C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yjvduzf\2⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pkzjotlj.exe" C:\Windows\SysWOW64\yjvduzf\2⤵PID:2004
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create yjvduzf binPath= "C:\Windows\SysWOW64\yjvduzf\pkzjotlj.exe /d\"C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description yjvduzf "wifi internet conection"2⤵
- Launches sc.exe
PID:3736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start yjvduzf2⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 12202⤵
- Program crash
PID:2996
-
-
C:\Windows\SysWOW64\yjvduzf\pkzjotlj.exeC:\Windows\SysWOW64\yjvduzf\pkzjotlj.exe /d"C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 5322⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1712 -ip 17121⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2556 -ip 25561⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD5fe593716212ef1f811ff4a1c2298989f
SHA124484bd48e2e4789307c91eb609e21c657f6cc4b
SHA2565420b7eb72c939a11f06e0a488df8cfe19fe87bebc0b9e3016ef25f846476439
SHA5127412a76fd3ed5d1e0c20fd937a2efbe03517f19c75eae877f742b47c1574dd19e97fd6412ef5579d2dfcbd12d6a026a15743600d53fd2cfb0029ed7182fb5cb5