Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
rXTqHar5Ud.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
rXTqHar5Ud.exe
Resource
win10v2004-20240802-en
General
-
Target
rXTqHar5Ud.exe
-
Size
397KB
-
MD5
f403202fb853377ceb67200005ef95b8
-
SHA1
1840e1495486209e92e5230cf1406f31a02699e7
-
SHA256
3eebf917efa82ea7b81f37e9f8c98a702254c5f0a487667a72e78d53a61ce363
-
SHA512
13b130d6f2ac8be444e16d4b1116812179d5043912a7aa24bd0d566eeecf4447be09fd54266dc12ff1902569d048c93a2d0c827abc135b0159f8156c18f9bf7a
-
SSDEEP
6144:7BYOcLH6/xNtFxaS3DpwmEIey0bGWEbje2bkln5eOy8:76Ocb6/r/xv2GWaeaklQT8
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2852 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zomjxwom\ImagePath = "C:\\Windows\\SysWOW64\\zomjxwom\\fmtwlzsc.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2296 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
fmtwlzsc.exepid process 2780 fmtwlzsc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fmtwlzsc.exedescription pid process target process PID 2780 set thread context of 2296 2780 fmtwlzsc.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2300 sc.exe 2784 sc.exe 2844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exesc.exefmtwlzsc.exenetsh.exesvchost.exerXTqHar5Ud.exesc.exesc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmtwlzsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rXTqHar5Ud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
rXTqHar5Ud.exefmtwlzsc.exedescription pid process target process PID 2960 wrote to memory of 2824 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2824 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2824 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2824 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2484 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2484 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2484 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2484 2960 rXTqHar5Ud.exe cmd.exe PID 2960 wrote to memory of 2300 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2300 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2300 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2300 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2784 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2784 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2784 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2784 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2844 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2844 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2844 2960 rXTqHar5Ud.exe sc.exe PID 2960 wrote to memory of 2844 2960 rXTqHar5Ud.exe sc.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2780 wrote to memory of 2296 2780 fmtwlzsc.exe svchost.exe PID 2960 wrote to memory of 2852 2960 rXTqHar5Ud.exe netsh.exe PID 2960 wrote to memory of 2852 2960 rXTqHar5Ud.exe netsh.exe PID 2960 wrote to memory of 2852 2960 rXTqHar5Ud.exe netsh.exe PID 2960 wrote to memory of 2852 2960 rXTqHar5Ud.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rXTqHar5Ud.exe"C:\Users\Admin\AppData\Local\Temp\rXTqHar5Ud.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zomjxwom\2⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fmtwlzsc.exe" C:\Windows\SysWOW64\zomjxwom\2⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zomjxwom binPath= "C:\Windows\SysWOW64\zomjxwom\fmtwlzsc.exe /d\"C:\Users\Admin\AppData\Local\Temp\rXTqHar5Ud.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zomjxwom "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zomjxwom2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\zomjxwom\fmtwlzsc.exeC:\Windows\SysWOW64\zomjxwom\fmtwlzsc.exe /d"C:\Users\Admin\AppData\Local\Temp\rXTqHar5Ud.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD5d6697863d3f0f1d4000c1dfa197b2c97
SHA1b5af16452cb71a1d1b231308532dceb2f08db822
SHA25665f53e6c399731d1b0446c6c3777c1200e6ebba11c3ebbcd842bb30ce0c29348
SHA5122f3f5fac81740a7faa115ee7171a49a1e1f5187bbe179677612019cf4ea9955c45df4d15d1347749b9fff8c0208d357a243492f04b165ce92d593bb293f47945