Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-12-2020 15:39

General

  • Target

    977f60bb46c98f4fece2c317fc17c504.exe

  • Size

    14.2MB

  • MD5

    977f60bb46c98f4fece2c317fc17c504

  • SHA1

    d246ad0209ed7041b0ee9004b36a4bad0513d876

  • SHA256

    2d09b4467fcf47fe6e2f95ea3af4b5dffe0522d87c1cbbe85bbe71ba81d7f628

  • SHA512

    4104422354bce5a50c08dda09529ddaef96fde520a84cf5f3c2ebfec794dfd1ba0c3ae0c7483ca6aef9c104f389db07793e05f0b1905a0fe7d03609c01677a39

Malware Config

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\977f60bb46c98f4fece2c317fc17c504.exe
    "C:\Users\Admin\AppData\Local\Temp\977f60bb46c98f4fece2c317fc17c504.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rzxpbtpk\
      2⤵
        PID:492
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vxlmaiku.exe" C:\Windows\SysWOW64\rzxpbtpk\
        2⤵
          PID:4108
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create rzxpbtpk binPath= "C:\Windows\SysWOW64\rzxpbtpk\vxlmaiku.exe /d\"C:\Users\Admin\AppData\Local\Temp\977f60bb46c98f4fece2c317fc17c504.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:3808
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description rzxpbtpk "wifi internet conection"
            2⤵
              PID:4240
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start rzxpbtpk
              2⤵
                PID:636
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:992
              • C:\Windows\SysWOW64\rzxpbtpk\vxlmaiku.exe
                C:\Windows\SysWOW64\rzxpbtpk\vxlmaiku.exe /d"C:\Users\Admin\AppData\Local\Temp\977f60bb46c98f4fece2c317fc17c504.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:996
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                    PID:1164

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                New Service

                1
                T1050

                Modify Existing Service

                1
                T1031

                Privilege Escalation

                New Service

                1
                T1050

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\vxlmaiku.exe
                  MD5

                  28234ae45dc5bc28da0f4294f21df217

                  SHA1

                  99ef252a789bf8f72428227ef647b3be72207d60

                  SHA256

                  5f29586f0fc6214e7100a5a0ec0fc4c5567441b7d8ded66e746f9016ead0a738

                  SHA512

                  c127e879ecc3f926f32a5828bc47bb3b901a04e8316506f495cadd65de5dbc7240e131d8feba98d566df4de41269714e50c3a9234256a361fe5fb22905f00748

                • C:\Windows\SysWOW64\rzxpbtpk\vxlmaiku.exe
                  MD5

                  28234ae45dc5bc28da0f4294f21df217

                  SHA1

                  99ef252a789bf8f72428227ef647b3be72207d60

                  SHA256

                  5f29586f0fc6214e7100a5a0ec0fc4c5567441b7d8ded66e746f9016ead0a738

                  SHA512

                  c127e879ecc3f926f32a5828bc47bb3b901a04e8316506f495cadd65de5dbc7240e131d8feba98d566df4de41269714e50c3a9234256a361fe5fb22905f00748

                • memory/492-2-0x0000000000000000-mapping.dmp
                • memory/636-7-0x0000000000000000-mapping.dmp
                • memory/992-8-0x0000000000000000-mapping.dmp
                • memory/1164-10-0x0000000000DA0000-0x0000000000DB5000-memory.dmp
                  Filesize

                  84KB

                • memory/1164-11-0x0000000000DA9A6B-mapping.dmp
                • memory/3808-5-0x0000000000000000-mapping.dmp
                • memory/4108-3-0x0000000000000000-mapping.dmp
                • memory/4240-6-0x0000000000000000-mapping.dmp