Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-12-2020 14:15

General

  • Target

    354b570754a39b62f08fa243e04e0ac4.exe

  • Size

    11.8MB

  • MD5

    354b570754a39b62f08fa243e04e0ac4

  • SHA1

    9662324cd2f8a2f1600ba42b64cf14b30d05b57f

  • SHA256

    65b06139254e9d7ad3e56e67b498473d31abb7e8b9a32a1a537fd9ec607232ff

  • SHA512

    b5e315aaec0e8b6d4968110cbb73d344a371410e6d7b879145156895823eeed9fda7430c39a2b9f87451fb70fc44d41bfd6e651d11d53cbe70637134f0dd24b6

Malware Config

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe
    "C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gbusfnda\
      2⤵
        PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sbtsbnri.exe" C:\Windows\SysWOW64\gbusfnda\
        2⤵
          PID:3876
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gbusfnda binPath= "C:\Windows\SysWOW64\gbusfnda\sbtsbnri.exe /d\"C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:3284
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description gbusfnda "wifi internet conection"
            2⤵
              PID:196
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start gbusfnda
              2⤵
                PID:424
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1688
              • C:\Windows\SysWOW64\gbusfnda\sbtsbnri.exe
                C:\Windows\SysWOW64\gbusfnda\sbtsbnri.exe /d"C:\Users\Admin\AppData\Local\Temp\354b570754a39b62f08fa243e04e0ac4.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1332
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Deletes itself
                  PID:1148

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\sbtsbnri.exe
                MD5

                52398eaaf4e546d11e5dd1a2f39f4e2d

                SHA1

                a215b31e311853c7613d7b70e7de68602184b658

                SHA256

                f1a70598441e7dd48c1a5ec3772b52267a242027d334e445a67bb98e1d6499f0

                SHA512

                93fae9257d297e4aea7f2ab291650113304dfdf1c998c7a624dd3a66f7f9d6adf3e56a08885f40dce5236dd1d8ee56a5abe69134ece280adb6f521d00f3f8d7b

              • C:\Windows\SysWOW64\gbusfnda\sbtsbnri.exe
                MD5

                52398eaaf4e546d11e5dd1a2f39f4e2d

                SHA1

                a215b31e311853c7613d7b70e7de68602184b658

                SHA256

                f1a70598441e7dd48c1a5ec3772b52267a242027d334e445a67bb98e1d6499f0

                SHA512

                93fae9257d297e4aea7f2ab291650113304dfdf1c998c7a624dd3a66f7f9d6adf3e56a08885f40dce5236dd1d8ee56a5abe69134ece280adb6f521d00f3f8d7b

              • memory/196-6-0x0000000000000000-mapping.dmp
              • memory/424-7-0x0000000000000000-mapping.dmp
              • memory/1148-10-0x0000000000B00000-0x0000000000B15000-memory.dmp
                Filesize

                84KB

              • memory/1148-11-0x0000000000B09A6B-mapping.dmp
              • memory/1148-12-0x0000000000B00000-0x0000000000B15000-memory.dmp
                Filesize

                84KB

              • memory/1688-8-0x0000000000000000-mapping.dmp
              • memory/2296-2-0x0000000000000000-mapping.dmp
              • memory/3284-5-0x0000000000000000-mapping.dmp
              • memory/3876-3-0x0000000000000000-mapping.dmp