Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-06-2022 19:10

General

  • Target

    7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7.exe

  • Size

    10.8MB

  • MD5

    4b4802c89976506b504b279dd3d58c89

  • SHA1

    2652b1943e3580254b59617b8d6a1cae361d3bd1

  • SHA256

    7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7

  • SHA512

    0d5d41af269d083d8fb532a9bed8bb16a0d4d113c4faf7520fea1237b5cea6cddbda4a1f484450a96e11b0ad8c5290a7a15c03326df335335f95a6ff4723554e

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7.exe
    "C:\Users\Admin\AppData\Local\Temp\7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nyjecvnh\
      2⤵
        PID:1052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xxyjefdl.exe" C:\Windows\SysWOW64\nyjecvnh\
        2⤵
          PID:2032
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create nyjecvnh binPath= "C:\Windows\SysWOW64\nyjecvnh\xxyjefdl.exe /d\"C:\Users\Admin\AppData\Local\Temp\7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1992
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description nyjecvnh "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1960
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start nyjecvnh
          2⤵
          • Launches sc.exe
          PID:676
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:1132
      • C:\Windows\SysWOW64\nyjecvnh\xxyjefdl.exe
        C:\Windows\SysWOW64\nyjecvnh\xxyjefdl.exe /d"C:\Users\Admin\AppData\Local\Temp\7ddd22e8dd26436cade10fc9488b0239f2db65589eb486ed551e30569ea5bdc7.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:748
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:1692

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\xxyjefdl.exe
        Filesize

        13.0MB

        MD5

        19e3975b58a3b202ec012d7cbe1a039b

        SHA1

        ffb5ca7638b36f629aef4bfba6afb34997bfa453

        SHA256

        55487488fc9525a3b001222693e80f6d20ef7b68b02096c689817b65784fe583

        SHA512

        30289c3cf6dafbb88a2cff594fea19906a4222e90f5bb1ed92698ee4dcf936c70407b1f8a15dd72b0578dbd8a97f70d725894ef82250cf4a337474a318b2fb64

      • C:\Windows\SysWOW64\nyjecvnh\xxyjefdl.exe
        Filesize

        13.0MB

        MD5

        19e3975b58a3b202ec012d7cbe1a039b

        SHA1

        ffb5ca7638b36f629aef4bfba6afb34997bfa453

        SHA256

        55487488fc9525a3b001222693e80f6d20ef7b68b02096c689817b65784fe583

        SHA512

        30289c3cf6dafbb88a2cff594fea19906a4222e90f5bb1ed92698ee4dcf936c70407b1f8a15dd72b0578dbd8a97f70d725894ef82250cf4a337474a318b2fb64

      • memory/676-63-0x0000000000000000-mapping.dmp
      • memory/748-78-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/748-76-0x0000000000D6B000-0x0000000000D79000-memory.dmp
        Filesize

        56KB

      • memory/952-56-0x0000000000DAB000-0x0000000000DB9000-memory.dmp
        Filesize

        56KB

      • memory/952-58-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/952-57-0x0000000000220000-0x0000000000233000-memory.dmp
        Filesize

        76KB

      • memory/952-54-0x00000000750C1000-0x00000000750C3000-memory.dmp
        Filesize

        8KB

      • memory/952-67-0x0000000000400000-0x0000000000C25000-memory.dmp
        Filesize

        8.1MB

      • memory/952-66-0x0000000000DAB000-0x0000000000DB9000-memory.dmp
        Filesize

        56KB

      • memory/1052-55-0x0000000000000000-mapping.dmp
      • memory/1132-65-0x0000000000000000-mapping.dmp
      • memory/1692-70-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1692-72-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1692-73-0x0000000000089A6B-mapping.dmp
      • memory/1692-79-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1692-80-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1960-62-0x0000000000000000-mapping.dmp
      • memory/1992-61-0x0000000000000000-mapping.dmp
      • memory/2032-59-0x0000000000000000-mapping.dmp