Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
d710da2c72712a5234c12cbc19c9ce38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d710da2c72712a5234c12cbc19c9ce38.exe
Resource
win10v2004-20240226-en
General
-
Target
d710da2c72712a5234c12cbc19c9ce38.exe
-
Size
10.2MB
-
MD5
d710da2c72712a5234c12cbc19c9ce38
-
SHA1
3287b628791bffbc35f07d8ad2d2257fcdcd931b
-
SHA256
9b67f3a84d397896a8119a69bf0f52a0013df1392ad7f76b525cdfa3320844c8
-
SHA512
69ec218075e472144947b246b0adb7f5487762a554118fc8f97e2a0e8275e5d33733ba8718c7d57e41517ab0697cc0679eebc9e1ffc5ad2f942707b924f01ba5
-
SSDEEP
196608:RvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvP:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2788 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vakxrefl\ImagePath = "C:\\Windows\\SysWOW64\\vakxrefl\\wrbesddl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation d710da2c72712a5234c12cbc19c9ce38.exe -
Deletes itself 1 IoCs
pid Process 1424 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 wrbesddl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5076 set thread context of 1424 5076 wrbesddl.exe 111 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4200 sc.exe 4736 sc.exe 4748 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3364 4948 WerFault.exe 86 4064 5076 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2004 4948 d710da2c72712a5234c12cbc19c9ce38.exe 90 PID 4948 wrote to memory of 2004 4948 d710da2c72712a5234c12cbc19c9ce38.exe 90 PID 4948 wrote to memory of 2004 4948 d710da2c72712a5234c12cbc19c9ce38.exe 90 PID 4948 wrote to memory of 1248 4948 d710da2c72712a5234c12cbc19c9ce38.exe 92 PID 4948 wrote to memory of 1248 4948 d710da2c72712a5234c12cbc19c9ce38.exe 92 PID 4948 wrote to memory of 1248 4948 d710da2c72712a5234c12cbc19c9ce38.exe 92 PID 4948 wrote to memory of 4200 4948 d710da2c72712a5234c12cbc19c9ce38.exe 94 PID 4948 wrote to memory of 4200 4948 d710da2c72712a5234c12cbc19c9ce38.exe 94 PID 4948 wrote to memory of 4200 4948 d710da2c72712a5234c12cbc19c9ce38.exe 94 PID 4948 wrote to memory of 4736 4948 d710da2c72712a5234c12cbc19c9ce38.exe 96 PID 4948 wrote to memory of 4736 4948 d710da2c72712a5234c12cbc19c9ce38.exe 96 PID 4948 wrote to memory of 4736 4948 d710da2c72712a5234c12cbc19c9ce38.exe 96 PID 4948 wrote to memory of 4748 4948 d710da2c72712a5234c12cbc19c9ce38.exe 98 PID 4948 wrote to memory of 4748 4948 d710da2c72712a5234c12cbc19c9ce38.exe 98 PID 4948 wrote to memory of 4748 4948 d710da2c72712a5234c12cbc19c9ce38.exe 98 PID 4948 wrote to memory of 2788 4948 d710da2c72712a5234c12cbc19c9ce38.exe 101 PID 4948 wrote to memory of 2788 4948 d710da2c72712a5234c12cbc19c9ce38.exe 101 PID 4948 wrote to memory of 2788 4948 d710da2c72712a5234c12cbc19c9ce38.exe 101 PID 5076 wrote to memory of 1424 5076 wrbesddl.exe 111 PID 5076 wrote to memory of 1424 5076 wrbesddl.exe 111 PID 5076 wrote to memory of 1424 5076 wrbesddl.exe 111 PID 5076 wrote to memory of 1424 5076 wrbesddl.exe 111 PID 5076 wrote to memory of 1424 5076 wrbesddl.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\d710da2c72712a5234c12cbc19c9ce38.exe"C:\Users\Admin\AppData\Local\Temp\d710da2c72712a5234c12cbc19c9ce38.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vakxrefl\2⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wrbesddl.exe" C:\Windows\SysWOW64\vakxrefl\2⤵PID:1248
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vakxrefl binPath= "C:\Windows\SysWOW64\vakxrefl\wrbesddl.exe /d\"C:\Users\Admin\AppData\Local\Temp\d710da2c72712a5234c12cbc19c9ce38.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4200
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vakxrefl "wifi internet conection"2⤵
- Launches sc.exe
PID:4736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vakxrefl2⤵
- Launches sc.exe
PID:4748
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 7882⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\vakxrefl\wrbesddl.exeC:\Windows\SysWOW64\vakxrefl\wrbesddl.exe /d"C:\Users\Admin\AppData\Local\Temp\d710da2c72712a5234c12cbc19c9ce38.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 5202⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4948 -ip 49481⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5076 -ip 50761⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5fd1cc907394b4d8e0d6654f1f3ead5f2
SHA156ff332fcb9a3996f2f82d52e1cb6a5b4ac35387
SHA25620527cca593241b3020a9022a90d47a000f077374ea480af467b84e20edcf31b
SHA51204217bd5c8a46c93736404e54b696ead2b3ea33f8a42fd25ce0fc2ff61c4b4c9fc9458b0771ee6d92f65e01138f5e40897cc7d9b8472592850cf86c60a429c9a
-
Filesize
13.9MB
MD5258182e65cda47706d70aadaeb68db7e
SHA11ef5ade0078982a73213ec67eb82c92ca555a7d2
SHA256f2c015b8b92e4f2fcbfdc9eab48cc5ae77502723c31622f4ad40a9133c5ba31b
SHA512dab1537ff6bbf4e31c85f1a59740136bc2fafc4252563e7962e2875d9d43d7299056c8d3f39dcbde6a694c7ecabb4938e01d50317cf30a4d7f3c670b34d26496