Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe
Resource
win10v2004-20240802-en
General
-
Target
b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe
-
Size
11.6MB
-
MD5
fed6d9f141d4ac6b3388a2c90722bd62
-
SHA1
3480f699c94d4a520c8d92dfd2f6c84d5bd9668b
-
SHA256
b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf
-
SHA512
f678216084e177bc51879d697f6e4201449874ed1c6f4c41fc1cb62aecf8ed5c3ab17784c1d30c481ee99c727fe0a29cd2854bdcaf554b3da425d59b5e957719
-
SSDEEP
6144:rc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:r1OZDisvwdaxO0PuG1R4CWs
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\objvakwk = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2760 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\objvakwk\ImagePath = "C:\\Windows\\SysWOW64\\objvakwk\\htbyerxv.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1656 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 htbyerxv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 1656 2936 htbyerxv.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2648 sc.exe 2672 sc.exe 2768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbyerxv.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 5cfe193da96fc50224edb47d450dd49d134286d6db3e66aba46d34fdc48d541dd2a9244d41cd945d24ee786f470dd49d651bc693b57f26f3955500d3f1b5541de4ad743d04cd945d24edb47d440dd49d642df4bd844d14dda46d34fdc48d541de4ad743d04cd945d24edb47d440dd49d64cbf5bd84a934d4a40096ac9b8d541de4ac743d04a1fb3e4581d71b230d25b8649d069884a4719e03f234fdc48d541de4ae743d04abf83c439eeb083469d4ad644f9bcfea1270bcd00834ccf1b46d2cdc98400e32cdfd3924db8248703ae2af5119f4d5ed127db9a45c02cff7b9652ad29e413d68a2f539419feb14200de09d0d5df489bc7426e5915a04c4c4fe266bbbd91d5061cda56a16d88649733ee1ab64419bdee5214ba9cd0051fdf5b86d24d59541083cfc942f5688c712287bd4eb5d1ac289b1743ab0c50e5892b1e97a758bde003d svchost.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2236 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 30 PID 1988 wrote to memory of 2236 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 30 PID 1988 wrote to memory of 2236 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 30 PID 1988 wrote to memory of 2236 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 30 PID 1988 wrote to memory of 2260 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 32 PID 1988 wrote to memory of 2260 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 32 PID 1988 wrote to memory of 2260 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 32 PID 1988 wrote to memory of 2260 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 32 PID 1988 wrote to memory of 2672 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 34 PID 1988 wrote to memory of 2672 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 34 PID 1988 wrote to memory of 2672 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 34 PID 1988 wrote to memory of 2672 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 34 PID 1988 wrote to memory of 2768 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 36 PID 1988 wrote to memory of 2768 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 36 PID 1988 wrote to memory of 2768 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 36 PID 1988 wrote to memory of 2768 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 36 PID 1988 wrote to memory of 2648 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 38 PID 1988 wrote to memory of 2648 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 38 PID 1988 wrote to memory of 2648 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 38 PID 1988 wrote to memory of 2648 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 38 PID 1988 wrote to memory of 2760 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 41 PID 1988 wrote to memory of 2760 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 41 PID 1988 wrote to memory of 2760 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 41 PID 1988 wrote to memory of 2760 1988 b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe 41 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43 PID 2936 wrote to memory of 1656 2936 htbyerxv.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe"C:\Users\Admin\AppData\Local\Temp\b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\objvakwk\2⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\htbyerxv.exe" C:\Windows\SysWOW64\objvakwk\2⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create objvakwk binPath= "C:\Windows\SysWOW64\objvakwk\htbyerxv.exe /d\"C:\Users\Admin\AppData\Local\Temp\b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description objvakwk "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start objvakwk2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\objvakwk\htbyerxv.exeC:\Windows\SysWOW64\objvakwk\htbyerxv.exe /d"C:\Users\Admin\AppData\Local\Temp\b84685b177c7bbd6e54c0cd81f5ac41c02e2c77a400b71a830636f93a686eaaf.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD58e33e460705d237d3a9e41d52368fc89
SHA16a22ea3c0939c7193dfe91427b7dd2ac58cf1684
SHA2563faac830f618b737857a1c01310ea51f0895396cf33fb8b2683618431d079391
SHA5125bc23b27c22654580230a9b5a82a6713ba0bd83c49c927dd256e6f172e5ef31457bfac2ddf1fb020cf7eaff48d2e9ff9a4bcc2aefbdfc1e0acae8d40927d1372