Analysis
-
max time kernel
140s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe
Resource
win10v2004-20240226-en
General
-
Target
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe
-
Size
233KB
-
MD5
9f72ad79bba9d398a150be4b676c624b
-
SHA1
f06218c9fb624ba6a8040846c1a888e6dacc6fb6
-
SHA256
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981
-
SHA512
bd7a919b1773115756c1b795fc3111132f7acd8290e2d82c25e6b6d03510bc61f7736c3b1fee2794bd3492e103121018d83565d2dea79287481b99f31bdbb393
-
SSDEEP
3072:1oCTZcw8fGJiR21K9Np5Y4xL1JTp0C2bhUQiGkRo8DegwT:1ob/vFF2bhd8l
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2628 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe -
Executes dropped EXE 1 IoCs
Processes:
dgzkktuu.exepid process 1100 dgzkktuu.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4584 sc.exe 2576 sc.exe 1668 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2340 2368 WerFault.exe c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exedescription pid process target process PID 2368 wrote to memory of 4284 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 4284 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 4284 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 3352 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 3352 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 3352 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe cmd.exe PID 2368 wrote to memory of 4584 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 4584 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 4584 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 2576 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 2576 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 2576 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 1668 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 1668 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 1668 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe sc.exe PID 2368 wrote to memory of 2628 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe netsh.exe PID 2368 wrote to memory of 2628 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe netsh.exe PID 2368 wrote to memory of 2628 2368 c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe"C:\Users\Admin\AppData\Local\Temp\c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lperffvk\2⤵PID:4284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dgzkktuu.exe" C:\Windows\SysWOW64\lperffvk\2⤵PID:3352
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lperffvk binPath= "C:\Windows\SysWOW64\lperffvk\dgzkktuu.exe /d\"C:\Users\Admin\AppData\Local\Temp\c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4584
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lperffvk "wifi internet conection"2⤵
- Launches sc.exe
PID:2576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lperffvk2⤵
- Launches sc.exe
PID:1668
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 10402⤵
- Program crash
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:2248
-
C:\Windows\SysWOW64\lperffvk\dgzkktuu.exeC:\Windows\SysWOW64\lperffvk\dgzkktuu.exe /d"C:\Users\Admin\AppData\Local\Temp\c5fe1e625c87aa811d76f20079f286f5b9f3b5c971d5ba86350c37327c509981.exe"1⤵
- Executes dropped EXE
PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2368 -ip 23681⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.6MB
MD5f427bf205318891ecd18f60cb4663502
SHA12c785119566e7ae42c18f82d814700509794e43b
SHA256b14de998814d8e442f1cde35bdaadc0826783bcfc9ffb35afebad6f55aec9882
SHA51254bd16286a9bae7c55db9b8ed4daeabb9f55cef59f174b72cb9ec747e4d4962badf717e64828b315f44d5431d81005f8044225b819747cfb9bd716c8c79b7e23