Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
ccc0fda39468b0b05708c2a70b8f6da7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccc0fda39468b0b05708c2a70b8f6da7.exe
Resource
win10v2004-20240226-en
General
-
Target
ccc0fda39468b0b05708c2a70b8f6da7.exe
-
Size
13.1MB
-
MD5
ccc0fda39468b0b05708c2a70b8f6da7
-
SHA1
40d22b54f2efa41a802c9f2d5cf115742f10b061
-
SHA256
e8493767ef4c9ef760027ecd5700839392714513b37653681be91ef1b60d6cb2
-
SHA512
125e2bf982335f67841d0bb3010b07bfbec52116e0ae6e66414906dcb6d0e142157dfcb8ed97124e1ab10121ae697606f043497ce0cc9c3b14ff87df6e757fc6
-
SSDEEP
49152:iWYi3SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSv:iW
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2476 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dbvwntox\ImagePath = "C:\\Windows\\SysWOW64\\dbvwntox\\fkgywzl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ccc0fda39468b0b05708c2a70b8f6da7.exe -
Deletes itself 1 IoCs
pid Process 3084 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 fkgywzl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 3084 2844 fkgywzl.exe 114 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3920 sc.exe 1544 sc.exe 4504 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4108 1392 WerFault.exe 86 3624 2844 WerFault.exe 105 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1392 wrote to memory of 3964 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 95 PID 1392 wrote to memory of 3964 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 95 PID 1392 wrote to memory of 3964 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 95 PID 1392 wrote to memory of 4004 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 97 PID 1392 wrote to memory of 4004 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 97 PID 1392 wrote to memory of 4004 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 97 PID 1392 wrote to memory of 3920 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 99 PID 1392 wrote to memory of 3920 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 99 PID 1392 wrote to memory of 3920 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 99 PID 1392 wrote to memory of 1544 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 101 PID 1392 wrote to memory of 1544 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 101 PID 1392 wrote to memory of 1544 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 101 PID 1392 wrote to memory of 4504 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 103 PID 1392 wrote to memory of 4504 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 103 PID 1392 wrote to memory of 4504 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 103 PID 1392 wrote to memory of 2476 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 107 PID 1392 wrote to memory of 2476 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 107 PID 1392 wrote to memory of 2476 1392 ccc0fda39468b0b05708c2a70b8f6da7.exe 107 PID 2844 wrote to memory of 3084 2844 fkgywzl.exe 114 PID 2844 wrote to memory of 3084 2844 fkgywzl.exe 114 PID 2844 wrote to memory of 3084 2844 fkgywzl.exe 114 PID 2844 wrote to memory of 3084 2844 fkgywzl.exe 114 PID 2844 wrote to memory of 3084 2844 fkgywzl.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc0fda39468b0b05708c2a70b8f6da7.exe"C:\Users\Admin\AppData\Local\Temp\ccc0fda39468b0b05708c2a70b8f6da7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dbvwntox\2⤵PID:3964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fkgywzl.exe" C:\Windows\SysWOW64\dbvwntox\2⤵PID:4004
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dbvwntox binPath= "C:\Windows\SysWOW64\dbvwntox\fkgywzl.exe /d\"C:\Users\Admin\AppData\Local\Temp\ccc0fda39468b0b05708c2a70b8f6da7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3920
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dbvwntox "wifi internet conection"2⤵
- Launches sc.exe
PID:1544
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dbvwntox2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 11842⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\dbvwntox\fkgywzl.exeC:\Windows\SysWOW64\dbvwntox\fkgywzl.exe /d"C:\Users\Admin\AppData\Local\Temp\ccc0fda39468b0b05708c2a70b8f6da7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 5082⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1392 -ip 13921⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2844 -ip 28441⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD56b67234483fa6ebf5519e6704a8ee762
SHA173022d00d17d7f528a105e7bbdbfe1ecb3237501
SHA2561f526de86ed0b565874fd6672cc3f7c75d5c661efa440fd8dc9f564ab026914a
SHA512811bce93f55526ccc91c8c9df02f3aada1cfea1bb6fdc082cf9d558520ca6fb04f9ef7003c1ba540296ffc9a6557f936822fd6f6c7eeba8d21178090f6a3d720
-
Filesize
3.1MB
MD580092696914e5893c03d100abda2f9fe
SHA11b7101b43d2dafa1f7df32ca2679d501cf5dfb4a
SHA256456aab8790d1e21d3c03f64d6fad058d327ae242df7da41bbee2cf6abec32ac9
SHA512a8e002dd48584008276bf4e89b5854a26ec25ccd320e58f11892602eca227a34d34783d422510395260cd7607f3cc7e720b4f52d069b8a4783d4b4e3c66bbd6e