Analysis

  • max time kernel
    91s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-06-2022 07:23

General

  • Target

    e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe

  • Size

    300KB

  • MD5

    925e5cc6c24e1e19a63e0864fb3b0b7e

  • SHA1

    50b910f1c263181179dcd374116384309c1452bd

  • SHA256

    e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757

  • SHA512

    f91c1a890f74dd637bc1a99f13a2c0de522a088246a10e065c2246bb531082ce872205520843386125e1421d456243885466a1307985446a82ec223b42f71246

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe
    "C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe
      "C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4312
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jdrskmkg\
        3⤵
          PID:5060
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hwgkxyn.exe" C:\Windows\SysWOW64\jdrskmkg\
          3⤵
            PID:2720
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create jdrskmkg binPath= "C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe /d\"C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe\"" type= own start= auto DisplayName= "wifi support"
            3⤵
            • Launches sc.exe
            PID:2308
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description jdrskmkg "wifi internet conection"
            3⤵
            • Launches sc.exe
            PID:3624
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start jdrskmkg
            3⤵
            • Launches sc.exe
            PID:1092
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            3⤵
            • Modifies Windows Firewall
            PID:1684
      • C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe
        C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe /d"C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe
          C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe /d"C:\Users\Admin\AppData\Local\Temp\e9941d6066edc610eeab228d15dc7cea14d2613d5005e2040ba49d510c012757.exe"
          2⤵
          • Executes dropped EXE
          PID:2692

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      New Service

      1
      T1050

      Modify Existing Service

      1
      T1031

      Privilege Escalation

      New Service

      1
      T1050

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\hwgkxyn.exe
        Filesize

        10.5MB

        MD5

        26c8b297e3dd75ae134019021f4dc22c

        SHA1

        7cd3ec555a4890c08a0eb2cd025ed426fa77e431

        SHA256

        9639a957f348faa4c390c3c8cb9e1fac9a6e7916c7f1934051427ccdb996a4da

        SHA512

        e64a8734876fda3c320b75248c1fd3630fa888aa987127d2c1760e1dd7d75c35fa99a5ce2f6c0d679adf74abbc491304c1f48d80693ec4caf4c19d89fdf808ba

      • C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe
        Filesize

        10.5MB

        MD5

        26c8b297e3dd75ae134019021f4dc22c

        SHA1

        7cd3ec555a4890c08a0eb2cd025ed426fa77e431

        SHA256

        9639a957f348faa4c390c3c8cb9e1fac9a6e7916c7f1934051427ccdb996a4da

        SHA512

        e64a8734876fda3c320b75248c1fd3630fa888aa987127d2c1760e1dd7d75c35fa99a5ce2f6c0d679adf74abbc491304c1f48d80693ec4caf4c19d89fdf808ba

      • C:\Windows\SysWOW64\jdrskmkg\hwgkxyn.exe
        Filesize

        10.5MB

        MD5

        26c8b297e3dd75ae134019021f4dc22c

        SHA1

        7cd3ec555a4890c08a0eb2cd025ed426fa77e431

        SHA256

        9639a957f348faa4c390c3c8cb9e1fac9a6e7916c7f1934051427ccdb996a4da

        SHA512

        e64a8734876fda3c320b75248c1fd3630fa888aa987127d2c1760e1dd7d75c35fa99a5ce2f6c0d679adf74abbc491304c1f48d80693ec4caf4c19d89fdf808ba

      • memory/1092-142-0x0000000000000000-mapping.dmp
      • memory/1684-144-0x0000000000000000-mapping.dmp
      • memory/2308-140-0x0000000000000000-mapping.dmp
      • memory/2692-153-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/2692-152-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/2692-151-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/2692-146-0x0000000000000000-mapping.dmp
      • memory/2720-138-0x0000000000000000-mapping.dmp
      • memory/3624-141-0x0000000000000000-mapping.dmp
      • memory/4312-130-0x0000000000000000-mapping.dmp
      • memory/4312-145-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/4312-136-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/4312-135-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/4312-131-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/4720-134-0x0000000002DF0000-0x0000000002E04000-memory.dmp
        Filesize

        80KB

      • memory/4720-133-0x0000000002F7E000-0x0000000002F8C000-memory.dmp
        Filesize

        56KB

      • memory/4884-150-0x0000000002E99000-0x0000000002EA7000-memory.dmp
        Filesize

        56KB

      • memory/5060-137-0x0000000000000000-mapping.dmp