Analysis

  • max time kernel
    146s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 08:16

General

  • Target

    4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0.exe

  • Size

    341KB

  • MD5

    c8a7a319ce6c507a8fa2b90c201c728e

  • SHA1

    d0683f663b502598c4f2c543cb1c2554eebd6e61

  • SHA256

    4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0

  • SHA512

    98c46849126cf94a3a9ac7c0c7e6525f44e2b46b77d6700e7c0adc61054b78f9cdc3d7bddecaf1ed4922d5f5af8c0426396ee26dcb31970225523118666864fc

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0.exe
    "C:\Users\Admin\AppData\Local\Temp\4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gorrweyt\
      2⤵
        PID:628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ihtpueob.exe" C:\Windows\SysWOW64\gorrweyt\
        2⤵
          PID:1436
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gorrweyt binPath= "C:\Windows\SysWOW64\gorrweyt\ihtpueob.exe /d\"C:\Users\Admin\AppData\Local\Temp\4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:948
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description gorrweyt "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1672
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start gorrweyt
          2⤵
          • Launches sc.exe
          PID:584
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:868
      • C:\Windows\SysWOW64\gorrweyt\ihtpueob.exe
        C:\Windows\SysWOW64\gorrweyt\ihtpueob.exe /d"C:\Users\Admin\AppData\Local\Temp\4c536a8728b5a2207332856d9aea7be3be41f0b2a921c049a73894e371ca6cb0.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:876

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      New Service

      1
      T1050

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Privilege Escalation

      New Service

      1
      T1050

      Defense Evasion

      Disabling Security Tools

      1
      T1089

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ihtpueob.exe
        Filesize

        10.9MB

        MD5

        844c8640c830196b8d7c568a3cac7596

        SHA1

        1b8551552e3d92e82042fbee7317adcb07b4cc83

        SHA256

        4647b4bf686d484448d17ceaa079dea71809c67cf7f40322421e11cd6758bab7

        SHA512

        1e292a9dcb73ae1a71b988cd68b97f9932284b8bc4f0226db2dcad3b03979f078f9d600b084622688a1cec38ed5f0cce162bccf31a048f52f8a0faa60e9c4e17

      • C:\Windows\SysWOW64\gorrweyt\ihtpueob.exe
        Filesize

        10.9MB

        MD5

        844c8640c830196b8d7c568a3cac7596

        SHA1

        1b8551552e3d92e82042fbee7317adcb07b4cc83

        SHA256

        4647b4bf686d484448d17ceaa079dea71809c67cf7f40322421e11cd6758bab7

        SHA512

        1e292a9dcb73ae1a71b988cd68b97f9932284b8bc4f0226db2dcad3b03979f078f9d600b084622688a1cec38ed5f0cce162bccf31a048f52f8a0faa60e9c4e17

      • memory/584-64-0x0000000000000000-mapping.dmp
      • memory/628-56-0x0000000000000000-mapping.dmp
      • memory/868-78-0x0000000000000000-mapping.dmp
      • memory/876-81-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/876-77-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/876-71-0x0000000000089A6B-mapping.dmp
      • memory/876-68-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/876-70-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/900-73-0x0000000000B20000-0x0000000000B31000-memory.dmp
        Filesize

        68KB

      • memory/900-66-0x0000000000B20000-0x0000000000B31000-memory.dmp
        Filesize

        68KB

      • memory/900-76-0x0000000000400000-0x000000000094F000-memory.dmp
        Filesize

        5.3MB

      • memory/948-62-0x0000000000000000-mapping.dmp
      • memory/1436-60-0x0000000000000000-mapping.dmp
      • memory/1644-59-0x0000000000400000-0x000000000094F000-memory.dmp
        Filesize

        5.3MB

      • memory/1644-54-0x0000000000300000-0x0000000000311000-memory.dmp
        Filesize

        68KB

      • memory/1644-57-0x0000000000300000-0x0000000000311000-memory.dmp
        Filesize

        68KB

      • memory/1644-79-0x0000000000400000-0x000000000094F000-memory.dmp
        Filesize

        5.3MB

      • memory/1644-58-0x0000000000020000-0x0000000000033000-memory.dmp
        Filesize

        76KB

      • memory/1644-55-0x0000000075841000-0x0000000075843000-memory.dmp
        Filesize

        8KB

      • memory/1672-63-0x0000000000000000-mapping.dmp