Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-12-2020 17:08

General

  • Target

    f14a46d2d5535867d84aa11fa8ae5c2c.exe

  • Size

    10.2MB

  • MD5

    f14a46d2d5535867d84aa11fa8ae5c2c

  • SHA1

    39d19968f1106dae2917f838e15643ed2fba35ef

  • SHA256

    b36c42fd589f6eeacc8f5b4fb21b37c4eef8bd1a8a8a737d8e7e8d09f9f6e1dd

  • SHA512

    0b7c5a97747333358cd41631c178f4810b54287e6516950f82e933e9909c3d66809d291985ed4d53b68920d9fba84bd9f7721b1ba80f96ce88668debf608df2b

Malware Config

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f14a46d2d5535867d84aa11fa8ae5c2c.exe
    "C:\Users\Admin\AppData\Local\Temp\f14a46d2d5535867d84aa11fa8ae5c2c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cgwnbrfw\
      2⤵
        PID:3676
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ribelykj.exe" C:\Windows\SysWOW64\cgwnbrfw\
        2⤵
          PID:3028
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create cgwnbrfw binPath= "C:\Windows\SysWOW64\cgwnbrfw\ribelykj.exe /d\"C:\Users\Admin\AppData\Local\Temp\f14a46d2d5535867d84aa11fa8ae5c2c.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:4076
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description cgwnbrfw "wifi internet conection"
            2⤵
              PID:2012
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start cgwnbrfw
              2⤵
                PID:2232
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:3288
              • C:\Windows\SysWOW64\cgwnbrfw\ribelykj.exe
                C:\Windows\SysWOW64\cgwnbrfw\ribelykj.exe /d"C:\Users\Admin\AppData\Local\Temp\f14a46d2d5535867d84aa11fa8ae5c2c.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3612
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Deletes itself
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:3452

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\ribelykj.exe
                MD5

                5618ef4ed0d65b80536162deaa96932e

                SHA1

                6587dd8469c5adc1a86c1dcb6053eabf61c6fe4b

                SHA256

                d0c4c0038876c9a307bac2ddd5f549e0712a1633ff639692026adc72e8ff50a8

                SHA512

                c058ee7e47eb5f9c75160a35f99ba35623e4ccbb22f396cb038e070ff73a827842e9d41a8212c065c8ab22e92fa0b83a63c66fab7d188ef293e81e1eeb18ee24

              • C:\Windows\SysWOW64\cgwnbrfw\ribelykj.exe
                MD5

                5618ef4ed0d65b80536162deaa96932e

                SHA1

                6587dd8469c5adc1a86c1dcb6053eabf61c6fe4b

                SHA256

                d0c4c0038876c9a307bac2ddd5f549e0712a1633ff639692026adc72e8ff50a8

                SHA512

                c058ee7e47eb5f9c75160a35f99ba35623e4ccbb22f396cb038e070ff73a827842e9d41a8212c065c8ab22e92fa0b83a63c66fab7d188ef293e81e1eeb18ee24

              • memory/2012-6-0x0000000000000000-mapping.dmp
              • memory/2232-7-0x0000000000000000-mapping.dmp
              • memory/3028-3-0x0000000000000000-mapping.dmp
              • memory/3288-8-0x0000000000000000-mapping.dmp
              • memory/3452-10-0x0000000000370000-0x0000000000385000-memory.dmp
                Filesize

                84KB

              • memory/3452-11-0x0000000000379A6B-mapping.dmp
              • memory/3676-2-0x0000000000000000-mapping.dmp
              • memory/4076-5-0x0000000000000000-mapping.dmp