Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    20-10-2021 06:23

General

  • Target

    a1d23796732487b40ce43b22983327b2.exe

  • Size

    279KB

  • MD5

    a1d23796732487b40ce43b22983327b2

  • SHA1

    a9b5b16d21b145997a803857a743ce79ac0383b1

  • SHA256

    84839e5c70038104b4d9fbf20988ebc952ea698be6d46c0ad5ed072897427b3f

  • SHA512

    2521705f6645ecd3897d880a2d7cadaadf9fe790715a5a026b564d4fe498f1cea2bca06fb2fd4dd1e3b0a9e3de50a061b48092dde6a97634734b8a68b4b30df0

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 16 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1d23796732487b40ce43b22983327b2.exe
    "C:\Users\Admin\AppData\Local\Temp\a1d23796732487b40ce43b22983327b2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rjxovwgn\
      2⤵
        PID:1896
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qafszuti.exe" C:\Windows\SysWOW64\rjxovwgn\
        2⤵
          PID:668
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create rjxovwgn binPath= "C:\Windows\SysWOW64\rjxovwgn\qafszuti.exe /d\"C:\Users\Admin\AppData\Local\Temp\a1d23796732487b40ce43b22983327b2.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:564
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description rjxovwgn "wifi internet conection"
            2⤵
              PID:1356
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start rjxovwgn
              2⤵
                PID:1492
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1852
              • C:\Windows\SysWOW64\rjxovwgn\qafszuti.exe
                C:\Windows\SysWOW64\rjxovwgn\qafszuti.exe /d"C:\Users\Admin\AppData\Local\Temp\a1d23796732487b40ce43b22983327b2.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1656
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Deletes itself
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:1432
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                      PID:1796

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                New Service

                1
                T1050

                Modify Existing Service

                1
                T1031

                Registry Run Keys / Startup Folder

                1
                T1060

                Privilege Escalation

                New Service

                1
                T1050

                Defense Evasion

                Disabling Security Tools

                1
                T1089

                Modify Registry

                2
                T1112

                Discovery

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\qafszuti.exe
                  MD5

                  2a41f59866372b3422de69bd27439f5e

                  SHA1

                  b7ea0db1a4c27562b193a122ecca62c78aa4d12c

                  SHA256

                  da5d2871e18e3899e3132692e656afdb4f5cd646efafc401b798e42363067c04

                  SHA512

                  1b35dd110c7da4b500e7c1f5de81ad6d225671244dd01ee779e3210f31a6b81296b90e5cea74b93d5c50c8ffcd5f77bcad5a789101c5e7222fd18379ca24b0f0

                • C:\Windows\SysWOW64\rjxovwgn\qafszuti.exe
                  MD5

                  2a41f59866372b3422de69bd27439f5e

                  SHA1

                  b7ea0db1a4c27562b193a122ecca62c78aa4d12c

                  SHA256

                  da5d2871e18e3899e3132692e656afdb4f5cd646efafc401b798e42363067c04

                  SHA512

                  1b35dd110c7da4b500e7c1f5de81ad6d225671244dd01ee779e3210f31a6b81296b90e5cea74b93d5c50c8ffcd5f77bcad5a789101c5e7222fd18379ca24b0f0

                • memory/564-61-0x0000000000000000-mapping.dmp
                • memory/668-59-0x0000000000000000-mapping.dmp
                • memory/1128-55-0x0000000074B41000-0x0000000074B43000-memory.dmp
                  Filesize

                  8KB

                • memory/1128-56-0x0000000000220000-0x0000000000233000-memory.dmp
                  Filesize

                  76KB

                • memory/1128-54-0x0000000002FED000-0x0000000002FFB000-memory.dmp
                  Filesize

                  56KB

                • memory/1128-58-0x0000000000400000-0x0000000002F0D000-memory.dmp
                  Filesize

                  43.1MB

                • memory/1356-62-0x0000000000000000-mapping.dmp
                • memory/1432-71-0x0000000000109A6B-mapping.dmp
                • memory/1432-69-0x0000000000100000-0x0000000000115000-memory.dmp
                  Filesize

                  84KB

                • memory/1432-70-0x0000000000100000-0x0000000000115000-memory.dmp
                  Filesize

                  84KB

                • memory/1432-74-0x0000000000100000-0x0000000000115000-memory.dmp
                  Filesize

                  84KB

                • memory/1492-63-0x0000000000000000-mapping.dmp
                • memory/1656-66-0x000000000030D000-0x000000000031B000-memory.dmp
                  Filesize

                  56KB

                • memory/1656-73-0x0000000000400000-0x0000000002F0D000-memory.dmp
                  Filesize

                  43.1MB

                • memory/1796-75-0x0000000000290000-0x0000000000381000-memory.dmp
                  Filesize

                  964KB

                • memory/1796-76-0x0000000000290000-0x0000000000381000-memory.dmp
                  Filesize

                  964KB

                • memory/1852-64-0x0000000000000000-mapping.dmp
                • memory/1896-57-0x0000000000000000-mapping.dmp