Analysis

  • max time kernel
    208s
  • max time network
    222s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26-06-2022 01:13

General

  • Target

    36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701.exe

  • Size

    108KB

  • MD5

    3a7c9b7345930efda1b033b5ffd6888c

  • SHA1

    cce9d9ece4bbf8666894d3d52ba3bcf243140a12

  • SHA256

    36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701

  • SHA512

    8b76eba6a981f493b1afac3a39d62f2c91eb1919dcb439f9d9b6aa86bce20e8c66c7a91f33d0f64244cde8c974a5cffe70384320db388b71d268f9e3938d0d9a

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701.exe
    "C:\Users\Admin\AppData\Local\Temp\36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bkbmtzds\
      2⤵
        PID:628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zbwneyfy.exe" C:\Windows\SysWOW64\bkbmtzds\
        2⤵
          PID:956
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create bkbmtzds binPath= "C:\Windows\SysWOW64\bkbmtzds\zbwneyfy.exe /d\"C:\Users\Admin\AppData\Local\Temp\36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1016
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description bkbmtzds "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:588
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start bkbmtzds
          2⤵
          • Launches sc.exe
          PID:544
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:1548
      • C:\Windows\SysWOW64\bkbmtzds\zbwneyfy.exe
        C:\Windows\SysWOW64\bkbmtzds\zbwneyfy.exe /d"C:\Users\Admin\AppData\Local\Temp\36dd37703b6b84eb31184299be5935fd79e46b4c7b9a3f7c2bbdd73a9bedb701.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:1252

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      New Service

      1
      T1050

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Privilege Escalation

      New Service

      1
      T1050

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\zbwneyfy.exe
        Filesize

        13.2MB

        MD5

        ae7f9d39ec2151c89f32230617f551bd

        SHA1

        b64500a31cc7c2926dd2a8a148189688e264c950

        SHA256

        686c349e04a669c336298cd7eb69cc242ff459a6806eecad87c3a8fbbbac0b37

        SHA512

        da3129d4b8117e45e83adfdd6c4948f5301cabaf253926c89b557c0013e00f9ef3872846da3b55d49eee7cf596d404807c0692a7aaed545521d35a4397197d37

      • C:\Windows\SysWOW64\bkbmtzds\zbwneyfy.exe
        Filesize

        13.2MB

        MD5

        ae7f9d39ec2151c89f32230617f551bd

        SHA1

        b64500a31cc7c2926dd2a8a148189688e264c950

        SHA256

        686c349e04a669c336298cd7eb69cc242ff459a6806eecad87c3a8fbbbac0b37

        SHA512

        da3129d4b8117e45e83adfdd6c4948f5301cabaf253926c89b557c0013e00f9ef3872846da3b55d49eee7cf596d404807c0692a7aaed545521d35a4397197d37

      • memory/544-63-0x0000000000000000-mapping.dmp
      • memory/588-62-0x0000000000000000-mapping.dmp
      • memory/628-58-0x0000000000000000-mapping.dmp
      • memory/956-59-0x0000000000000000-mapping.dmp
      • memory/1016-61-0x0000000000000000-mapping.dmp
      • memory/1252-70-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1252-72-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1252-73-0x0000000000089A6B-mapping.dmp
      • memory/1252-78-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1252-80-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1344-57-0x0000000076171000-0x0000000076173000-memory.dmp
        Filesize

        8KB

      • memory/1344-56-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1344-65-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1344-55-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1344-54-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1548-64-0x0000000000000000-mapping.dmp
      • memory/1968-67-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/1968-74-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB