Analysis

  • max time kernel
    1800s
  • max time network
    1797s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-06-2022 03:25

General

  • Target

    c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16.exe

  • Size

    13.7MB

  • MD5

    5408cff5586901cfb35b5ed13505c161

  • SHA1

    e929d7dc906bdc0eb20c4009b085443bc7af996f

  • SHA256

    c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16

  • SHA512

    f1f6bde7b47b13da6ede09ae7e25e1ac5444880cea3ed2bbad2a806ae7e80393998670febb7bbc0bd0221a3a9ce741b2a39ad7199ad561061e0545ae0966558c

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16.exe
    "C:\Users\Admin\AppData\Local\Temp\c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fboteabs\
      2⤵
        PID:1932
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ydnicoln.exe" C:\Windows\SysWOW64\fboteabs\
        2⤵
          PID:1720
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create fboteabs binPath= "C:\Windows\SysWOW64\fboteabs\ydnicoln.exe /d\"C:\Users\Admin\AppData\Local\Temp\c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2032
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description fboteabs "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1408
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start fboteabs
          2⤵
          • Launches sc.exe
          PID:1808
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:672
      • C:\Windows\SysWOW64\fboteabs\ydnicoln.exe
        C:\Windows\SysWOW64\fboteabs\ydnicoln.exe /d"C:\Users\Admin\AppData\Local\Temp\c5af074d1dc7563538561414790ce838b29a04f80c877a0d3e235b83a2130d16.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:1084

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      New Service

      1
      T1050

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Privilege Escalation

      New Service

      1
      T1050

      Defense Evasion

      Disabling Security Tools

      1
      T1089

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ydnicoln.exe
        Filesize

        10.1MB

        MD5

        5499e38f55c2ed605762d0aff1bd38c9

        SHA1

        6d4109d1959d18555ecdee7b4af03450d2183efc

        SHA256

        441e4f2f0690aeb60caeef2c9c9cd9ec68de54ebdffe8bc84dda02736da929c8

        SHA512

        b9b0789031173e403d29846798deb3c122b841345de57b7e98d20f836facb1d077d69040f4556b51948d6937cea89c76f44d9aef3a47082a3c536a361d22c8f4

      • C:\Windows\SysWOW64\fboteabs\ydnicoln.exe
        Filesize

        10.1MB

        MD5

        5499e38f55c2ed605762d0aff1bd38c9

        SHA1

        6d4109d1959d18555ecdee7b4af03450d2183efc

        SHA256

        441e4f2f0690aeb60caeef2c9c9cd9ec68de54ebdffe8bc84dda02736da929c8

        SHA512

        b9b0789031173e403d29846798deb3c122b841345de57b7e98d20f836facb1d077d69040f4556b51948d6937cea89c76f44d9aef3a47082a3c536a361d22c8f4

      • memory/336-74-0x0000000000D2B000-0x0000000000D39000-memory.dmp
        Filesize

        56KB

      • memory/336-77-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/672-65-0x0000000000000000-mapping.dmp
      • memory/1084-72-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1084-70-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1084-80-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1084-79-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1084-73-0x0000000000089A6B-mapping.dmp
      • memory/1376-54-0x0000000075361000-0x0000000075363000-memory.dmp
        Filesize

        8KB

      • memory/1376-66-0x0000000000CFB000-0x0000000000D09000-memory.dmp
        Filesize

        56KB

      • memory/1376-67-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/1376-57-0x0000000000220000-0x0000000000233000-memory.dmp
        Filesize

        76KB

      • memory/1376-58-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/1376-56-0x0000000000CFB000-0x0000000000D09000-memory.dmp
        Filesize

        56KB

      • memory/1408-62-0x0000000000000000-mapping.dmp
      • memory/1720-59-0x0000000000000000-mapping.dmp
      • memory/1808-63-0x0000000000000000-mapping.dmp
      • memory/1932-55-0x0000000000000000-mapping.dmp
      • memory/2032-61-0x0000000000000000-mapping.dmp