Analysis

  • max time kernel
    1794s
  • max time network
    1786s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-06-2022 01:56

General

  • Target

    5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946.exe

  • Size

    10.5MB

  • MD5

    222c77202aaadbae9167f125d5235c93

  • SHA1

    bdaa4533ebd52e7c4936cc2612ae9cc850ccdd6c

  • SHA256

    5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946

  • SHA512

    834691c22d611de565c4b147728f74d7cc24b623c5bdda53f43e6fc129cce765a43cfb31982618e5fb341e676adf2eb816192b1fcb26a1cd00399429db46bbbe

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 21 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946.exe
    "C:\Users\Admin\AppData\Local\Temp\5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 604
      2⤵
      • Program crash
      PID:3576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 692
      2⤵
      • Program crash
      PID:1312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 844
      2⤵
      • Program crash
      PID:2836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 980
      2⤵
      • Program crash
      PID:3552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 736
      2⤵
      • Program crash
      PID:4724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 736
      2⤵
      • Program crash
      PID:4112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 840
      2⤵
      • Program crash
      PID:3144
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vafyauan\
      2⤵
        PID:4576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 924
        2⤵
        • Program crash
        PID:4304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1152
        2⤵
        • Program crash
        PID:4540
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mmnytusa.exe" C:\Windows\SysWOW64\vafyauan\
        2⤵
          PID:1480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 812
          2⤵
          • Program crash
          PID:4444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 668
          2⤵
          • Program crash
          PID:3472
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create vafyauan binPath= "C:\Windows\SysWOW64\vafyauan\mmnytusa.exe /d\"C:\Users\Admin\AppData\Local\Temp\5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1220
          2⤵
          • Program crash
          PID:2676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1164
          2⤵
          • Program crash
          PID:4764
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description vafyauan "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1168
          2⤵
          • Program crash
          PID:4588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1220
          2⤵
          • Program crash
          PID:2308
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start vafyauan
          2⤵
          • Launches sc.exe
          PID:4076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 812
          2⤵
          • Program crash
          PID:4156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 680
          2⤵
          • Program crash
          PID:3672
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1040
          2⤵
          • Program crash
          PID:1716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1964 -ip 1964
        1⤵
          PID:2908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1964 -ip 1964
          1⤵
            PID:2572
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1964 -ip 1964
            1⤵
              PID:4348
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1964 -ip 1964
              1⤵
                PID:3860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1964 -ip 1964
                1⤵
                  PID:3496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1964 -ip 1964
                  1⤵
                    PID:3992
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1964 -ip 1964
                    1⤵
                      PID:3564
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1964 -ip 1964
                      1⤵
                        PID:1016
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1964 -ip 1964
                        1⤵
                          PID:4320
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1964 -ip 1964
                          1⤵
                            PID:2024
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1964 -ip 1964
                            1⤵
                              PID:3800
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1964 -ip 1964
                              1⤵
                                PID:740
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1964 -ip 1964
                                1⤵
                                  PID:4796
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1964 -ip 1964
                                  1⤵
                                    PID:224
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1964 -ip 1964
                                    1⤵
                                      PID:1668
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1964 -ip 1964
                                      1⤵
                                        PID:2568
                                      • C:\Windows\SysWOW64\vafyauan\mmnytusa.exe
                                        C:\Windows\SysWOW64\vafyauan\mmnytusa.exe /d"C:\Users\Admin\AppData\Local\Temp\5c9432e3f389b63a63d2aa8eed0e91350b86370539542f5a9f572395eabef946.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of WriteProcessMemory
                                        PID:3660
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 536
                                          2⤵
                                          • Program crash
                                          PID:632
                                        • C:\Windows\SysWOW64\svchost.exe
                                          svchost.exe
                                          2⤵
                                          • Sets service image path in registry
                                          PID:1236
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 544
                                          2⤵
                                          • Program crash
                                          PID:1636
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 536
                                          2⤵
                                          • Program crash
                                          PID:2176
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1964 -ip 1964
                                        1⤵
                                          PID:3628
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1964 -ip 1964
                                          1⤵
                                            PID:3716
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3660 -ip 3660
                                            1⤵
                                              PID:2440
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3660 -ip 3660
                                              1⤵
                                                PID:1840
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3660 -ip 3660
                                                1⤵
                                                  PID:1320

                                                Network

                                                MITRE ATT&CK Matrix ATT&CK v6

                                                Persistence

                                                New Service

                                                1
                                                T1050

                                                Modify Existing Service

                                                1
                                                T1031

                                                Registry Run Keys / Startup Folder

                                                1
                                                T1060

                                                Privilege Escalation

                                                New Service

                                                1
                                                T1050

                                                Defense Evasion

                                                Modify Registry

                                                1
                                                T1112

                                                Discovery

                                                Query Registry

                                                1
                                                T1012

                                                System Information Discovery

                                                2
                                                T1082

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\mmnytusa.exe
                                                  Filesize

                                                  14.7MB

                                                  MD5

                                                  06bde269eefefc468ba72c1b4cbba68d

                                                  SHA1

                                                  8de37d656292faeb9fd3fd2e55cd7eccda690caa

                                                  SHA256

                                                  48662cbe5e727debe574d0441e0b48ed0baa7565212080e08900b1b5b97ba2f4

                                                  SHA512

                                                  235a293b93ba44286611f01282dd91f6543f63963d864fd84e2a9bf472ab75f41ad61f3f36697abfe7fb2ebb7fcda7a3f95d43915fcb9e5600c274ba90a4e13e

                                                • C:\Windows\SysWOW64\vafyauan\mmnytusa.exe
                                                  Filesize

                                                  14.7MB

                                                  MD5

                                                  06bde269eefefc468ba72c1b4cbba68d

                                                  SHA1

                                                  8de37d656292faeb9fd3fd2e55cd7eccda690caa

                                                  SHA256

                                                  48662cbe5e727debe574d0441e0b48ed0baa7565212080e08900b1b5b97ba2f4

                                                  SHA512

                                                  235a293b93ba44286611f01282dd91f6543f63963d864fd84e2a9bf472ab75f41ad61f3f36697abfe7fb2ebb7fcda7a3f95d43915fcb9e5600c274ba90a4e13e

                                                • memory/212-137-0x0000000000000000-mapping.dmp
                                                • memory/792-136-0x0000000000000000-mapping.dmp
                                                • memory/1236-147-0x0000000000EA0000-0x0000000000EB5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1236-143-0x0000000000EA0000-0x0000000000EB5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1236-150-0x0000000000EA0000-0x0000000000EB5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1236-142-0x0000000000000000-mapping.dmp
                                                • memory/1480-134-0x0000000000000000-mapping.dmp
                                                • memory/1964-146-0x0000000000400000-0x0000000002321000-memory.dmp
                                                  Filesize

                                                  31.1MB

                                                • memory/1964-141-0x000000000249A000-0x00000000024A8000-memory.dmp
                                                  Filesize

                                                  56KB

                                                • memory/1964-131-0x00000000023F0000-0x0000000002403000-memory.dmp
                                                  Filesize

                                                  76KB

                                                • memory/1964-132-0x0000000000400000-0x0000000002321000-memory.dmp
                                                  Filesize

                                                  31.1MB

                                                • memory/1964-130-0x000000000249A000-0x00000000024A8000-memory.dmp
                                                  Filesize

                                                  56KB

                                                • memory/3608-140-0x0000000000000000-mapping.dmp
                                                • memory/3660-148-0x0000000002595000-0x00000000025A3000-memory.dmp
                                                  Filesize

                                                  56KB

                                                • memory/3660-149-0x0000000000400000-0x0000000002321000-memory.dmp
                                                  Filesize

                                                  31.1MB

                                                • memory/3660-151-0x0000000000400000-0x0000000002321000-memory.dmp
                                                  Filesize

                                                  31.1MB

                                                • memory/4076-138-0x0000000000000000-mapping.dmp
                                                • memory/4576-133-0x0000000000000000-mapping.dmp