Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
a2118c67534664afde234ba2dab7c02e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2118c67534664afde234ba2dab7c02e.exe
Resource
win10v2004-20240221-en
General
-
Target
a2118c67534664afde234ba2dab7c02e.exe
-
Size
10.2MB
-
MD5
a2118c67534664afde234ba2dab7c02e
-
SHA1
c398da3954e3d68ba1f05876d867ce57f9efbb34
-
SHA256
79940b2f535b1111facb217b7f3ed439eb91003b345e0e6bc049af42fbbe9b13
-
SHA512
cf20f6b7adfe95968ea411a4945f7460e72a234efb541cfd937105f7a8aa03f4ce93f5d09b341e37db65cb23e1f7304aacfe4f5d4ee72bdc5c0c04d2e4dbc79f
-
SSDEEP
24576:UlxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBv:UlzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\qjmskegm = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2800 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\qjmskegm\ImagePath = "C:\\Windows\\SysWOW64\\qjmskegm\\fjquwzpb.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2460 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 fjquwzpb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 2460 2496 fjquwzpb.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2604 sc.exe 2748 sc.exe 2848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2076 2208 a2118c67534664afde234ba2dab7c02e.exe 28 PID 2208 wrote to memory of 2076 2208 a2118c67534664afde234ba2dab7c02e.exe 28 PID 2208 wrote to memory of 2076 2208 a2118c67534664afde234ba2dab7c02e.exe 28 PID 2208 wrote to memory of 2076 2208 a2118c67534664afde234ba2dab7c02e.exe 28 PID 2208 wrote to memory of 2028 2208 a2118c67534664afde234ba2dab7c02e.exe 30 PID 2208 wrote to memory of 2028 2208 a2118c67534664afde234ba2dab7c02e.exe 30 PID 2208 wrote to memory of 2028 2208 a2118c67534664afde234ba2dab7c02e.exe 30 PID 2208 wrote to memory of 2028 2208 a2118c67534664afde234ba2dab7c02e.exe 30 PID 2208 wrote to memory of 2604 2208 a2118c67534664afde234ba2dab7c02e.exe 32 PID 2208 wrote to memory of 2604 2208 a2118c67534664afde234ba2dab7c02e.exe 32 PID 2208 wrote to memory of 2604 2208 a2118c67534664afde234ba2dab7c02e.exe 32 PID 2208 wrote to memory of 2604 2208 a2118c67534664afde234ba2dab7c02e.exe 32 PID 2208 wrote to memory of 2748 2208 a2118c67534664afde234ba2dab7c02e.exe 34 PID 2208 wrote to memory of 2748 2208 a2118c67534664afde234ba2dab7c02e.exe 34 PID 2208 wrote to memory of 2748 2208 a2118c67534664afde234ba2dab7c02e.exe 34 PID 2208 wrote to memory of 2748 2208 a2118c67534664afde234ba2dab7c02e.exe 34 PID 2208 wrote to memory of 2848 2208 a2118c67534664afde234ba2dab7c02e.exe 36 PID 2208 wrote to memory of 2848 2208 a2118c67534664afde234ba2dab7c02e.exe 36 PID 2208 wrote to memory of 2848 2208 a2118c67534664afde234ba2dab7c02e.exe 36 PID 2208 wrote to memory of 2848 2208 a2118c67534664afde234ba2dab7c02e.exe 36 PID 2208 wrote to memory of 2800 2208 a2118c67534664afde234ba2dab7c02e.exe 39 PID 2208 wrote to memory of 2800 2208 a2118c67534664afde234ba2dab7c02e.exe 39 PID 2208 wrote to memory of 2800 2208 a2118c67534664afde234ba2dab7c02e.exe 39 PID 2208 wrote to memory of 2800 2208 a2118c67534664afde234ba2dab7c02e.exe 39 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41 PID 2496 wrote to memory of 2460 2496 fjquwzpb.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2118c67534664afde234ba2dab7c02e.exe"C:\Users\Admin\AppData\Local\Temp\a2118c67534664afde234ba2dab7c02e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qjmskegm\2⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fjquwzpb.exe" C:\Windows\SysWOW64\qjmskegm\2⤵PID:2028
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qjmskegm binPath= "C:\Windows\SysWOW64\qjmskegm\fjquwzpb.exe /d\"C:\Users\Admin\AppData\Local\Temp\a2118c67534664afde234ba2dab7c02e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qjmskegm "wifi internet conection"2⤵
- Launches sc.exe
PID:2748
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qjmskegm2⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2800
-
-
C:\Windows\SysWOW64\qjmskegm\fjquwzpb.exeC:\Windows\SysWOW64\qjmskegm\fjquwzpb.exe /d"C:\Users\Admin\AppData\Local\Temp\a2118c67534664afde234ba2dab7c02e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.1MB
MD507f40493804978499d9963b58ca3dae6
SHA1c5f81bf633de07ebacb3e7cdd880092fffb852a3
SHA256d659aec535482b840939a7d90987e6c35b5b9b8610e65052c5289f7afd1243b7
SHA5129ec8192e49cb0a382c6b294c454ae5a58119ee59a8b8ba7ebe3f7915b4cae70692e73474c7aed6aba310b136613de82ee9398d9a8985199312a1d2a8329268ab
-
Filesize
8.1MB
MD5716f35e77e64f2813b9cfd983a8d1da7
SHA186e93fd8aa7d7748f8c229914767baa51de6e3f3
SHA25633487329bddfbc384d23c47fa2da36358b3cd6cdfa443a7b39af0538034aa394
SHA51231b8f8c800b7f657e667a79913993f1da383486477a078bfdcd114996875b384cb3b67ee2dbc27983f8e69e45bce3dd166329ef2bb43de2560e5c18dbe57bc6d