Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe
Resource
win10v2004-20240426-en
General
-
Target
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe
-
Size
12.1MB
-
MD5
db1af63eff5afab4bede9ffd3886b91a
-
SHA1
5030c06972023757b7d001fa12b02aadc07c3054
-
SHA256
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012
-
SHA512
97632ddd6e8efa10bfc648500fe39ac4f9650fc512a763b86a454a03c8512450dfef0156b925ee30ea30e5b617ac13810e3d8c90f4accfc9ccf9b9a99d88a62c
-
SSDEEP
196608:WT66666666666666666666666666666666666666666666666666666666666662:W
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5056 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\brqamyy\ImagePath = "C:\\Windows\\SysWOW64\\brqamyy\\zlxffqfn.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3612 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
zlxffqfn.exepid process 1340 zlxffqfn.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zlxffqfn.exedescription pid process target process PID 1340 set thread context of 3612 1340 zlxffqfn.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4896 sc.exe 3156 sc.exe 844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4428 1904 WerFault.exe 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe 2072 1340 WerFault.exe zlxffqfn.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exezlxffqfn.exedescription pid process target process PID 1904 wrote to memory of 4856 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4856 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4856 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4932 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4932 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4932 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe cmd.exe PID 1904 wrote to memory of 4896 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 4896 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 4896 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 3156 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 3156 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 3156 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 844 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 844 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 844 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe sc.exe PID 1904 wrote to memory of 5056 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe netsh.exe PID 1904 wrote to memory of 5056 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe netsh.exe PID 1904 wrote to memory of 5056 1904 23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe netsh.exe PID 1340 wrote to memory of 3612 1340 zlxffqfn.exe svchost.exe PID 1340 wrote to memory of 3612 1340 zlxffqfn.exe svchost.exe PID 1340 wrote to memory of 3612 1340 zlxffqfn.exe svchost.exe PID 1340 wrote to memory of 3612 1340 zlxffqfn.exe svchost.exe PID 1340 wrote to memory of 3612 1340 zlxffqfn.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe"C:\Users\Admin\AppData\Local\Temp\23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\brqamyy\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zlxffqfn.exe" C:\Windows\SysWOW64\brqamyy\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create brqamyy binPath= "C:\Windows\SysWOW64\brqamyy\zlxffqfn.exe /d\"C:\Users\Admin\AppData\Local\Temp\23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description brqamyy "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start brqamyy2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10362⤵
- Program crash
-
C:\Windows\SysWOW64\brqamyy\zlxffqfn.exeC:\Windows\SysWOW64\brqamyy\zlxffqfn.exe /d"C:\Users\Admin\AppData\Local\Temp\23922e5ee3a9ff743df4b5f29cb099c6e7ab41d64ffb4123b8a8fde439f5b012.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 5602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1904 -ip 19041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1340 -ip 13401⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\zlxffqfn.exeFilesize
13.6MB
MD57867265aa35c2acb372f3be0147e5ca6
SHA1a18201fdeab782563ef7ffeb2b0765a4d976041c
SHA25675df0c07c8efe984a6afd68f5d94a6935f9254aa860c1aca5ee0e0121f7c0c61
SHA512107fe764acde54c4f15a2ede76e0c9086002e99f5c2cf465ac4407625c8d21524722308e56e82163a4cefba41777c9fcb00695dde2f4c25aeade249dcc53ba85
-
memory/1340-15-0x0000000000400000-0x000000000086F000-memory.dmpFilesize
4.4MB
-
memory/1340-11-0x0000000000400000-0x000000000086F000-memory.dmpFilesize
4.4MB
-
memory/1340-16-0x0000000000400000-0x000000000086F000-memory.dmpFilesize
4.4MB
-
memory/1904-4-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1904-1-0x0000000000C00000-0x0000000000D00000-memory.dmpFilesize
1024KB
-
memory/1904-8-0x0000000000400000-0x000000000086F000-memory.dmpFilesize
4.4MB
-
memory/1904-10-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1904-9-0x00000000001C0000-0x00000000001D3000-memory.dmpFilesize
76KB
-
memory/1904-2-0x00000000001C0000-0x00000000001D3000-memory.dmpFilesize
76KB
-
memory/3612-12-0x0000000000B10000-0x0000000000B25000-memory.dmpFilesize
84KB
-
memory/3612-14-0x0000000000B10000-0x0000000000B25000-memory.dmpFilesize
84KB
-
memory/3612-17-0x0000000000B10000-0x0000000000B25000-memory.dmpFilesize
84KB