Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
751d870aa39047bca3a7e6cca0e11303.exe
Resource
win7-20231215-en
General
-
Target
751d870aa39047bca3a7e6cca0e11303.exe
-
Size
11.4MB
-
MD5
751d870aa39047bca3a7e6cca0e11303
-
SHA1
6220cacde3e1f98a5a1813ae7324ba951bcbe895
-
SHA256
47ce762a85469542401e2cdede7e409f236cca6d8c2f77337bdc31a31ad9f6c8
-
SHA512
5e553ba1c774731d30a79f406a9f21a6a7af393ac7a7cdc0598e4e672ebb4b9b88f716a9ecef86252aaa615df256ba37f874bf7f2eb6c2413be9b45a8e54a487
-
SSDEEP
12288:hTAazcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcn:9
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\agjqfwds = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2840 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\agjqfwds\ImagePath = "C:\\Windows\\SysWOW64\\agjqfwds\\xatbzbjt.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2560 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 xatbzbjt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2560 1632 xatbzbjt.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2856 sc.exe 2680 sc.exe 3032 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2396 2144 751d870aa39047bca3a7e6cca0e11303.exe 28 PID 2144 wrote to memory of 2396 2144 751d870aa39047bca3a7e6cca0e11303.exe 28 PID 2144 wrote to memory of 2396 2144 751d870aa39047bca3a7e6cca0e11303.exe 28 PID 2144 wrote to memory of 2396 2144 751d870aa39047bca3a7e6cca0e11303.exe 28 PID 2144 wrote to memory of 2300 2144 751d870aa39047bca3a7e6cca0e11303.exe 30 PID 2144 wrote to memory of 2300 2144 751d870aa39047bca3a7e6cca0e11303.exe 30 PID 2144 wrote to memory of 2300 2144 751d870aa39047bca3a7e6cca0e11303.exe 30 PID 2144 wrote to memory of 2300 2144 751d870aa39047bca3a7e6cca0e11303.exe 30 PID 2144 wrote to memory of 2856 2144 751d870aa39047bca3a7e6cca0e11303.exe 32 PID 2144 wrote to memory of 2856 2144 751d870aa39047bca3a7e6cca0e11303.exe 32 PID 2144 wrote to memory of 2856 2144 751d870aa39047bca3a7e6cca0e11303.exe 32 PID 2144 wrote to memory of 2856 2144 751d870aa39047bca3a7e6cca0e11303.exe 32 PID 2144 wrote to memory of 2680 2144 751d870aa39047bca3a7e6cca0e11303.exe 34 PID 2144 wrote to memory of 2680 2144 751d870aa39047bca3a7e6cca0e11303.exe 34 PID 2144 wrote to memory of 2680 2144 751d870aa39047bca3a7e6cca0e11303.exe 34 PID 2144 wrote to memory of 2680 2144 751d870aa39047bca3a7e6cca0e11303.exe 34 PID 2144 wrote to memory of 3032 2144 751d870aa39047bca3a7e6cca0e11303.exe 36 PID 2144 wrote to memory of 3032 2144 751d870aa39047bca3a7e6cca0e11303.exe 36 PID 2144 wrote to memory of 3032 2144 751d870aa39047bca3a7e6cca0e11303.exe 36 PID 2144 wrote to memory of 3032 2144 751d870aa39047bca3a7e6cca0e11303.exe 36 PID 2144 wrote to memory of 2840 2144 751d870aa39047bca3a7e6cca0e11303.exe 38 PID 2144 wrote to memory of 2840 2144 751d870aa39047bca3a7e6cca0e11303.exe 38 PID 2144 wrote to memory of 2840 2144 751d870aa39047bca3a7e6cca0e11303.exe 38 PID 2144 wrote to memory of 2840 2144 751d870aa39047bca3a7e6cca0e11303.exe 38 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41 PID 1632 wrote to memory of 2560 1632 xatbzbjt.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe"C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\agjqfwds\2⤵PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xatbzbjt.exe" C:\Windows\SysWOW64\agjqfwds\2⤵PID:2300
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create agjqfwds binPath= "C:\Windows\SysWOW64\agjqfwds\xatbzbjt.exe /d\"C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description agjqfwds "wifi internet conection"2⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start agjqfwds2⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2840
-
-
C:\Windows\SysWOW64\agjqfwds\xatbzbjt.exeC:\Windows\SysWOW64\agjqfwds\xatbzbjt.exe /d"C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD5fd65d80876f4dd37dda8e21f8595aaa5
SHA145ff9a8aa4cbf1a8b123ceb40fed4030264b8243
SHA2563e4adbbc991a1048b0f57b9ddbff840f931348f196cb73ab7bd9cd8e97c7db2d
SHA512b69bb136cc1ed4f8687ca5e1fa745a31e42e5472887b265f8729fc752c2718dca5b5e12c69f21875fc10c0a62c0590c2abe7a92e93945fd736b2112fb8142efd
-
Filesize
9.4MB
MD5f8b10b69f7721d514fc80dde11e6f49a
SHA15fb120bf0e3946b0f2cfc55db1e2f4fdb58845e9
SHA25611bf9030971f60d6a9eea4185b378b63059814ec2944e98640de168fdd16d577
SHA512fe2bbb2282577f1a4d94eee6dfd9dea70c90345ad18e94320b4a1870ef8874367b84878a5c6cfce18ae26910bf65de2ba06b7daa16bf25cf497e9891ffbb6873