Analysis

  • max time kernel
    146s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-12-2020 14:15

General

  • Target

    354b570754a39b62f08fa243e04e0ac4.exe

  • Size

    11.8MB

  • MD5

    354b570754a39b62f08fa243e04e0ac4

  • SHA1

    9662324cd2f8a2f1600ba42b64cf14b30d05b57f

  • SHA256

    65b06139254e9d7ad3e56e67b498473d31abb7e8b9a32a1a537fd9ec607232ff

  • SHA512

    b5e315aaec0e8b6d4968110cbb73d344a371410e6d7b879145156895823eeed9fda7430c39a2b9f87451fb70fc44d41bfd6e651d11d53cbe70637134f0dd24b6

Malware Config

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe
    "C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lbmnfxfj\
      2⤵
        PID:1984
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fvbuvdtc.exe" C:\Windows\SysWOW64\lbmnfxfj\
        2⤵
          PID:1416
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create lbmnfxfj binPath= "C:\Windows\SysWOW64\lbmnfxfj\fvbuvdtc.exe /d\"C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:616
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description lbmnfxfj "wifi internet conection"
            2⤵
              PID:1728
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start lbmnfxfj
              2⤵
                PID:1032
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1896
              • C:\Windows\SysWOW64\lbmnfxfj\fvbuvdtc.exe
                C:\Windows\SysWOW64\lbmnfxfj\fvbuvdtc.exe /d"C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:964
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Deletes itself
                  PID:1060

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\fvbuvdtc.exe
                MD5

                77d8358d1ee1b69d1ef3bf0ce33bab0e

                SHA1

                f8b43049e4bed39b28c12811aca759ea39d77d08

                SHA256

                4da07eef0d5ec4e818795fa22e40db17f3eaa953b8d3f25ec28e85249536626c

                SHA512

                cae8067d0c0f45b7f174535962700333f1331365d89ee569ca048786a940c0e159f43aecf466d966c37fd526f1d813e2f6d4fedbc9bab4413a0c027eee51de53

              • C:\Windows\SysWOW64\lbmnfxfj\fvbuvdtc.exe
                MD5

                77d8358d1ee1b69d1ef3bf0ce33bab0e

                SHA1

                f8b43049e4bed39b28c12811aca759ea39d77d08

                SHA256

                4da07eef0d5ec4e818795fa22e40db17f3eaa953b8d3f25ec28e85249536626c

                SHA512

                cae8067d0c0f45b7f174535962700333f1331365d89ee569ca048786a940c0e159f43aecf466d966c37fd526f1d813e2f6d4fedbc9bab4413a0c027eee51de53

              • memory/616-5-0x0000000000000000-mapping.dmp
              • memory/1032-7-0x0000000000000000-mapping.dmp
              • memory/1060-11-0x0000000000089A6B-mapping.dmp
              • memory/1060-10-0x0000000000080000-0x0000000000095000-memory.dmp
                Filesize

                84KB

              • memory/1416-3-0x0000000000000000-mapping.dmp
              • memory/1728-6-0x0000000000000000-mapping.dmp
              • memory/1896-8-0x0000000000000000-mapping.dmp
              • memory/1984-2-0x0000000000000000-mapping.dmp