Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
cc35570f8a6ca5eaa3b157d5129cf642.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc35570f8a6ca5eaa3b157d5129cf642.exe
Resource
win10v2004-20240226-en
General
-
Target
cc35570f8a6ca5eaa3b157d5129cf642.exe
-
Size
12.0MB
-
MD5
cc35570f8a6ca5eaa3b157d5129cf642
-
SHA1
183c1a4dd86f9e96aba6020770de442ba1cab90f
-
SHA256
961f5faa6835275d729394a3136e2a932540297fa9ccf7ced9f0bec24b191f39
-
SHA512
638b4c36533d05b96b19f046899fcdc471efc58cd0893def3daa3d83d5c219fb8de67fd436cba3e22586b70a70e35ef7241cb042175c6f9555be52f2112bce58
-
SSDEEP
24576:9lxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBD:9lzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3488 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\miqbagjk\ImagePath = "C:\\Windows\\SysWOW64\\miqbagjk\\ziuakfbr.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation cc35570f8a6ca5eaa3b157d5129cf642.exe -
Deletes itself 1 IoCs
pid Process 2600 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 ziuakfbr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4028 set thread context of 2600 4028 ziuakfbr.exe 111 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1412 sc.exe 3952 sc.exe 1300 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2956 4016 WerFault.exe 86 1108 4028 WerFault.exe 104 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4872 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 90 PID 4016 wrote to memory of 4872 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 90 PID 4016 wrote to memory of 4872 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 90 PID 4016 wrote to memory of 4680 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 92 PID 4016 wrote to memory of 4680 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 92 PID 4016 wrote to memory of 4680 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 92 PID 4016 wrote to memory of 1412 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 94 PID 4016 wrote to memory of 1412 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 94 PID 4016 wrote to memory of 1412 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 94 PID 4016 wrote to memory of 3952 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 97 PID 4016 wrote to memory of 3952 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 97 PID 4016 wrote to memory of 3952 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 97 PID 4016 wrote to memory of 1300 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 101 PID 4016 wrote to memory of 1300 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 101 PID 4016 wrote to memory of 1300 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 101 PID 4016 wrote to memory of 3488 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 105 PID 4016 wrote to memory of 3488 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 105 PID 4016 wrote to memory of 3488 4016 cc35570f8a6ca5eaa3b157d5129cf642.exe 105 PID 4028 wrote to memory of 2600 4028 ziuakfbr.exe 111 PID 4028 wrote to memory of 2600 4028 ziuakfbr.exe 111 PID 4028 wrote to memory of 2600 4028 ziuakfbr.exe 111 PID 4028 wrote to memory of 2600 4028 ziuakfbr.exe 111 PID 4028 wrote to memory of 2600 4028 ziuakfbr.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc35570f8a6ca5eaa3b157d5129cf642.exe"C:\Users\Admin\AppData\Local\Temp\cc35570f8a6ca5eaa3b157d5129cf642.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\miqbagjk\2⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ziuakfbr.exe" C:\Windows\SysWOW64\miqbagjk\2⤵PID:4680
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create miqbagjk binPath= "C:\Windows\SysWOW64\miqbagjk\ziuakfbr.exe /d\"C:\Users\Admin\AppData\Local\Temp\cc35570f8a6ca5eaa3b157d5129cf642.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1412
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description miqbagjk "wifi internet conection"2⤵
- Launches sc.exe
PID:3952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start miqbagjk2⤵
- Launches sc.exe
PID:1300
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 11882⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\miqbagjk\ziuakfbr.exeC:\Windows\SysWOW64\miqbagjk\ziuakfbr.exe /d"C:\Users\Admin\AppData\Local\Temp\cc35570f8a6ca5eaa3b157d5129cf642.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 5122⤵
- Program crash
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4016 -ip 40161⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4028 -ip 40281⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD574f6a35ae49aae3ac603e431550d7c84
SHA12cb6eaabb53bb9465f8261e7c8d7ea1e03cd05c1
SHA256a161721d11836e61801fbffbc1ae4db6b9051648812a0bc5f12dc36b954c8e5e
SHA5128cb7141eddda2507f376e7581c1fbe5557edd42b56cda13faf6254022a47e819e8569b74fed1552d699394b8d05c6a8ed54b0b81a59284e843c4eb5c6a64ecec
-
Filesize
4.9MB
MD5021f4a316f3e61ed574adc60bcf56439
SHA14fc2ed29254dbe708bd61a54afbc66d2380446c9
SHA25697d8202db5259656c2ef315a68c1ef3688050767f387c010b42df42c5b8e5d4a
SHA512bfaf50dc4fe60d01d216dd0e5fab8524c74ff4accaaf93c4ee2b6f8c46003e4e4b747bcfbe6a5efeac783756720a94bfe6a3812f6e0e067b2c7e388c8afd096f