Analysis
-
max time kernel
222s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe
Resource
win10v2004-20240412-en
General
-
Target
900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe
-
Size
204KB
-
MD5
1f57a9bb99804b8193ef503404bb7387
-
SHA1
674710911110b4b45030b990dabb3c45fd095b3f
-
SHA256
900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7
-
SHA512
d93b6d24f3fdb267a0d43195bbba3494cb2734756e5e3090cea9e65c584d66ca5eb1842bda274f484a42dac89f2fb196a2ef83e9f8e70dad4ca4b1351c3acce7
-
SSDEEP
3072:qfrB/GLaZdXUNc8iirJiM21K7uu+5Oiq08tJz5zoy887jImQpeBNMRDx/+cmH:qfrwclVORxv5z8kI1x2co
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 776 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\khctgfsb\ImagePath = "C:\\Windows\\SysWOW64\\khctgfsb\\wiuzwcbp.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2904 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
wiuzwcbp.exepid process 2108 wiuzwcbp.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wiuzwcbp.exedescription pid process target process PID 2108 set thread context of 2904 2108 wiuzwcbp.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2024 sc.exe 928 sc.exe 1108 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exewiuzwcbp.exedescription pid process target process PID 2360 wrote to memory of 2620 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2620 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2620 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2620 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2628 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2628 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2628 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2628 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe cmd.exe PID 2360 wrote to memory of 2024 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 2024 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 2024 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 2024 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 928 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 928 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 928 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 928 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 1108 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 1108 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 1108 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 1108 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe sc.exe PID 2360 wrote to memory of 776 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe netsh.exe PID 2360 wrote to memory of 776 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe netsh.exe PID 2360 wrote to memory of 776 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe netsh.exe PID 2360 wrote to memory of 776 2360 900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe netsh.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe PID 2108 wrote to memory of 2904 2108 wiuzwcbp.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe"C:\Users\Admin\AppData\Local\Temp\900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\khctgfsb\2⤵PID:2620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wiuzwcbp.exe" C:\Windows\SysWOW64\khctgfsb\2⤵PID:2628
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create khctgfsb binPath= "C:\Windows\SysWOW64\khctgfsb\wiuzwcbp.exe /d\"C:\Users\Admin\AppData\Local\Temp\900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2024
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description khctgfsb "wifi internet conection"2⤵
- Launches sc.exe
PID:928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start khctgfsb2⤵
- Launches sc.exe
PID:1108
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:776
-
-
C:\Windows\SysWOW64\khctgfsb\wiuzwcbp.exeC:\Windows\SysWOW64\khctgfsb\wiuzwcbp.exe /d"C:\Users\Admin\AppData\Local\Temp\900f15042c99288aef15c9187640b625ffec568147dd761f1508e9b61cc174d7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD52ba929051973e1ae02805299be42264e
SHA10fddd687892960c9ad6368a34f1b7f8cadc38218
SHA2563f86ed3399a424f86cbd05664cc1ad218d7bd0bacf8de6afc2141f732b6f89fe
SHA512a6ff76465dfd7aae6406b0c2a7f2b17c159022ae5d45c224a19b588bb7d1890274c471e3ea897f86827d1c6fe40bd34aa11e2e3bb274ccdc437bfe62edf8e533