Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
d706628ffe8d972d6c85bbb6bce0091f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d706628ffe8d972d6c85bbb6bce0091f.exe
Resource
win10v2004-20240226-en
General
-
Target
d706628ffe8d972d6c85bbb6bce0091f.exe
-
Size
10.6MB
-
MD5
d706628ffe8d972d6c85bbb6bce0091f
-
SHA1
c964e28b7b2744c5f52b58fd8fea7cc82261957c
-
SHA256
b6e325ef4151f615d91c91654957cee9f05cae4317453c77bc2cf8e33e32d316
-
SHA512
d603183402fde672b31b4f708de2e52ea86db0d8cba28f3bbd3b1f5f351638ec1e2acf4a4227cf4cae4b5ce4fc81b6be6b7d2b6923eb1bb7a711e39f20db8aa6
-
SSDEEP
24576:tLP+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4900 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xwizgqkr\ImagePath = "C:\\Windows\\SysWOW64\\xwizgqkr\\anenfsuo.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation d706628ffe8d972d6c85bbb6bce0091f.exe -
Deletes itself 1 IoCs
pid Process 3756 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2336 anenfsuo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 3756 2336 anenfsuo.exe 112 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4124 sc.exe 2712 sc.exe 4920 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2388 3216 WerFault.exe 87 3760 2336 WerFault.exe 105 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3464 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 91 PID 3216 wrote to memory of 3464 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 91 PID 3216 wrote to memory of 3464 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 91 PID 3216 wrote to memory of 5064 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 95 PID 3216 wrote to memory of 5064 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 95 PID 3216 wrote to memory of 5064 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 95 PID 3216 wrote to memory of 4124 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 97 PID 3216 wrote to memory of 4124 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 97 PID 3216 wrote to memory of 4124 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 97 PID 3216 wrote to memory of 2712 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 100 PID 3216 wrote to memory of 2712 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 100 PID 3216 wrote to memory of 2712 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 100 PID 3216 wrote to memory of 4920 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 103 PID 3216 wrote to memory of 4920 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 103 PID 3216 wrote to memory of 4920 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 103 PID 3216 wrote to memory of 4900 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 106 PID 3216 wrote to memory of 4900 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 106 PID 3216 wrote to memory of 4900 3216 d706628ffe8d972d6c85bbb6bce0091f.exe 106 PID 2336 wrote to memory of 3756 2336 anenfsuo.exe 112 PID 2336 wrote to memory of 3756 2336 anenfsuo.exe 112 PID 2336 wrote to memory of 3756 2336 anenfsuo.exe 112 PID 2336 wrote to memory of 3756 2336 anenfsuo.exe 112 PID 2336 wrote to memory of 3756 2336 anenfsuo.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\d706628ffe8d972d6c85bbb6bce0091f.exe"C:\Users\Admin\AppData\Local\Temp\d706628ffe8d972d6c85bbb6bce0091f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\xwizgqkr\2⤵PID:3464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\anenfsuo.exe" C:\Windows\SysWOW64\xwizgqkr\2⤵PID:5064
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create xwizgqkr binPath= "C:\Windows\SysWOW64\xwizgqkr\anenfsuo.exe /d\"C:\Users\Admin\AppData\Local\Temp\d706628ffe8d972d6c85bbb6bce0091f.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4124
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description xwizgqkr "wifi internet conection"2⤵
- Launches sc.exe
PID:2712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xwizgqkr2⤵
- Launches sc.exe
PID:4920
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 10362⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\xwizgqkr\anenfsuo.exeC:\Windows\SysWOW64\xwizgqkr\anenfsuo.exe /d"C:\Users\Admin\AppData\Local\Temp\d706628ffe8d972d6c85bbb6bce0091f.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 5322⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3216 -ip 32161⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2336 -ip 23361⤵PID:1356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5c7f6460b10b818ac34ac59ab2054f968
SHA14f9de8d167bfae6849018b8841abfcca39d5bd25
SHA256ef5b6e08247149db0e10bb875315a4cd99fa851dd55473230b4eb541bca91399
SHA5128ddaf5510dc9c96accda312ace9208be30109a17dca849fb19c148df2ed7f3f7e7bca85f3851899b755d472ec0d32fa0f3f13e5e8591dffd6f8b184ee1365f21
-
Filesize
6.7MB
MD528dcb8b184d781e252874c6dcacd37ff
SHA1862d3a02ec6a12e7dcdb1881566272042b746db9
SHA256b6c0adf52eae9a2c1ff6dc31be798178a442e787dbcba69b2e6f464c60377397
SHA51208702a2139da1f850c674dd55079a28fee22599c419a39c3c8a48b05a5c1419e85b452fa310eb44da223d6093978c1b5c2c62598b98dfb6cc3754beffbc4226f