Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2022 13:41

General

  • Target

    5c088a33041c8e0401b4d0eca1670346a9569b9bf4ce41db72a664954e2395c1.exe

  • Size

    6.4MB

  • MD5

    30fd8d41dcf3e7b9ce4aa1ed077efbfe

  • SHA1

    53418ba5aa14bc3c25c33f8f1afd29396fd4f393

  • SHA256

    5c088a33041c8e0401b4d0eca1670346a9569b9bf4ce41db72a664954e2395c1

  • SHA512

    dc1e33d0d8cf187905676713cf4fcbb5b01633bfa138322874c19246de4ab87b18a15753097ee4f217ac81762e3548865a64a6bbcd6d5d2463993b3031087d9a

  • SSDEEP

    196608:OJsj/2yInkh0D+3yavAf5jNnsSov4FVqe:f/2yIkui3yyAISXFVD

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c088a33041c8e0401b4d0eca1670346a9569b9bf4ce41db72a664954e2395c1.exe
    "C:\Users\Admin\AppData\Local\Temp\5c088a33041c8e0401b4d0eca1670346a9569b9bf4ce41db72a664954e2395c1.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\Pictures\Minor Policy\852V6IcLNy5Eiam1JIZ1HLaG.exe
      "C:\Users\Admin\Pictures\Minor Policy\852V6IcLNy5Eiam1JIZ1HLaG.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /y .\JV5mZK.B
        3⤵
          PID:800
      • C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe
        "C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lthhabze\
          3⤵
            PID:1996
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qwjexerm.exe" C:\Windows\SysWOW64\lthhabze\
            3⤵
              PID:1404
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" create lthhabze binPath= "C:\Windows\SysWOW64\lthhabze\qwjexerm.exe /d\"C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe\"" type= own start= auto DisplayName= "wifi support"
              3⤵
              • Launches sc.exe
              PID:1580
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" description lthhabze "wifi internet conection"
              3⤵
              • Launches sc.exe
              PID:1184
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start lthhabze
              3⤵
              • Launches sc.exe
              PID:1396
            • C:\Windows\SysWOW64\netsh.exe
              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
              3⤵
              • Modifies Windows Firewall
              PID:704
          • C:\Users\Admin\Pictures\Minor Policy\fd5U6ERdmH2o3A926f763l_Z.exe
            "C:\Users\Admin\Pictures\Minor Policy\fd5U6ERdmH2o3A926f763l_Z.exe"
            2⤵
              PID:1620
            • C:\Users\Admin\Pictures\Minor Policy\lw8iZMu72q42TwtsRQPEy8nW.exe
              "C:\Users\Admin\Pictures\Minor Policy\lw8iZMu72q42TwtsRQPEy8nW.exe"
              2⤵
                PID:2016
              • C:\Users\Admin\Pictures\Minor Policy\J5X6MTQjThpAScURcmoOR0MY.exe
                "C:\Users\Admin\Pictures\Minor Policy\J5X6MTQjThpAScURcmoOR0MY.exe"
                2⤵
                  PID:2044
                • C:\Users\Admin\Pictures\Minor Policy\nvScBFy335J9UhFvU0vl3Ob6.exe
                  "C:\Users\Admin\Pictures\Minor Policy\nvScBFy335J9UhFvU0vl3Ob6.exe"
                  2⤵
                    PID:1216
                  • C:\Users\Admin\Pictures\Minor Policy\psRH0RTLNuPeMuvVG85mZqCc.exe
                    "C:\Users\Admin\Pictures\Minor Policy\psRH0RTLNuPeMuvVG85mZqCc.exe"
                    2⤵
                      PID:1336
                    • C:\Users\Admin\Pictures\Minor Policy\VcZi49u9l5hi9pgLQHuZV8jL.exe
                      "C:\Users\Admin\Pictures\Minor Policy\VcZi49u9l5hi9pgLQHuZV8jL.exe"
                      2⤵
                        PID:1256
                      • C:\Users\Admin\Pictures\Minor Policy\_x7oWmqzHOvTzdWHEIaz88wn.exe
                        "C:\Users\Admin\Pictures\Minor Policy\_x7oWmqzHOvTzdWHEIaz88wn.exe"
                        2⤵
                          PID:1344
                        • C:\Users\Admin\Pictures\Minor Policy\wiS84JlVrPkLah38t3JCpIqu.exe
                          "C:\Users\Admin\Pictures\Minor Policy\wiS84JlVrPkLah38t3JCpIqu.exe"
                          2⤵
                            PID:900
                        • C:\Windows\SysWOW64\lthhabze\qwjexerm.exe
                          C:\Windows\SysWOW64\lthhabze\qwjexerm.exe /d"C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe"
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of WriteProcessMemory
                          PID:1608
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            2⤵
                            • Sets service image path in registry
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            PID:1628

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        New Service

                        1
                        T1050

                        Modify Existing Service

                        1
                        T1031

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Privilege Escalation

                        New Service

                        1
                        T1050

                        Defense Evasion

                        Modify Registry

                        2
                        T1112

                        Install Root Certificate

                        1
                        T1130

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Collection

                        Data from Local System

                        1
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\qwjexerm.exe
                          Filesize

                          11.0MB

                          MD5

                          0e8b8320fde6b897747493a63f073fd1

                          SHA1

                          76d57cea15e7f8030434a0782becab58e3ad5002

                          SHA256

                          15fb7085541c3b98ae85d198a6e5de3b5ab0a394ca588388d5111a1bb25d1747

                          SHA512

                          e47c56ac1327b5bdcd84bee8001c0ce7b86a334678af5609e15294d63b3b3719916a149a9647b075d0f3d00fc5adc079d70ea7d266957bc1a2055e088036c8de

                        • C:\Users\Admin\Pictures\Minor Policy\852V6IcLNy5Eiam1JIZ1HLaG.exe
                          Filesize

                          1.8MB

                          MD5

                          b8ba6be68ed100283134a099706867c5

                          SHA1

                          6f6c7ed3812eff1488c72679add579a5976ccab0

                          SHA256

                          2a2e3bfe05d3b240d13f9fd302b6b00818da4e8bb65fa7fd480606916b807f8e

                          SHA512

                          d1e24a7e79fdfbc34fd4e2b29e396ffc3771753c8747493998aee632d982a820cc5e8ff774398981bfb0912c8004cf7eae11a774b65be1dbe0e6b5297668a9e1

                        • C:\Users\Admin\Pictures\Minor Policy\852V6IcLNy5Eiam1JIZ1HLaG.exe
                          Filesize

                          1.8MB

                          MD5

                          b8ba6be68ed100283134a099706867c5

                          SHA1

                          6f6c7ed3812eff1488c72679add579a5976ccab0

                          SHA256

                          2a2e3bfe05d3b240d13f9fd302b6b00818da4e8bb65fa7fd480606916b807f8e

                          SHA512

                          d1e24a7e79fdfbc34fd4e2b29e396ffc3771753c8747493998aee632d982a820cc5e8ff774398981bfb0912c8004cf7eae11a774b65be1dbe0e6b5297668a9e1

                        • C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe
                          Filesize

                          232KB

                          MD5

                          d440eda2642b825a96ead2584a99df98

                          SHA1

                          8b46704cf6c5d0583c81591db5e51b3a7e694c97

                          SHA256

                          d849888234af0173d498b70bc2d402af850664776079fb3f28c45a8a126e5099

                          SHA512

                          28d09ed39066f48a15a5daac5e2951f11399f7e289adf4560b3b48ca6141a3016708db4e66b91ac6d7abe0919a5fc77db5dd6092fa874c5602693d71f4b2bf25

                        • C:\Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe
                          Filesize

                          232KB

                          MD5

                          d440eda2642b825a96ead2584a99df98

                          SHA1

                          8b46704cf6c5d0583c81591db5e51b3a7e694c97

                          SHA256

                          d849888234af0173d498b70bc2d402af850664776079fb3f28c45a8a126e5099

                          SHA512

                          28d09ed39066f48a15a5daac5e2951f11399f7e289adf4560b3b48ca6141a3016708db4e66b91ac6d7abe0919a5fc77db5dd6092fa874c5602693d71f4b2bf25

                        • C:\Windows\SysWOW64\lthhabze\qwjexerm.exe
                          Filesize

                          11.0MB

                          MD5

                          0e8b8320fde6b897747493a63f073fd1

                          SHA1

                          76d57cea15e7f8030434a0782becab58e3ad5002

                          SHA256

                          15fb7085541c3b98ae85d198a6e5de3b5ab0a394ca588388d5111a1bb25d1747

                          SHA512

                          e47c56ac1327b5bdcd84bee8001c0ce7b86a334678af5609e15294d63b3b3719916a149a9647b075d0f3d00fc5adc079d70ea7d266957bc1a2055e088036c8de

                        • \Users\Admin\Pictures\Minor Policy\852V6IcLNy5Eiam1JIZ1HLaG.exe
                          Filesize

                          1.8MB

                          MD5

                          b8ba6be68ed100283134a099706867c5

                          SHA1

                          6f6c7ed3812eff1488c72679add579a5976ccab0

                          SHA256

                          2a2e3bfe05d3b240d13f9fd302b6b00818da4e8bb65fa7fd480606916b807f8e

                          SHA512

                          d1e24a7e79fdfbc34fd4e2b29e396ffc3771753c8747493998aee632d982a820cc5e8ff774398981bfb0912c8004cf7eae11a774b65be1dbe0e6b5297668a9e1

                        • \Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe
                          Filesize

                          232KB

                          MD5

                          d440eda2642b825a96ead2584a99df98

                          SHA1

                          8b46704cf6c5d0583c81591db5e51b3a7e694c97

                          SHA256

                          d849888234af0173d498b70bc2d402af850664776079fb3f28c45a8a126e5099

                          SHA512

                          28d09ed39066f48a15a5daac5e2951f11399f7e289adf4560b3b48ca6141a3016708db4e66b91ac6d7abe0919a5fc77db5dd6092fa874c5602693d71f4b2bf25

                        • \Users\Admin\Pictures\Minor Policy\HYkv7jtzR9j1dj6wEEoBH1NU.exe
                          Filesize

                          232KB

                          MD5

                          d440eda2642b825a96ead2584a99df98

                          SHA1

                          8b46704cf6c5d0583c81591db5e51b3a7e694c97

                          SHA256

                          d849888234af0173d498b70bc2d402af850664776079fb3f28c45a8a126e5099

                          SHA512

                          28d09ed39066f48a15a5daac5e2951f11399f7e289adf4560b3b48ca6141a3016708db4e66b91ac6d7abe0919a5fc77db5dd6092fa874c5602693d71f4b2bf25

                        • \Users\Admin\Pictures\Minor Policy\J5X6MTQjThpAScURcmoOR0MY.exe
                          Filesize

                          270KB

                          MD5

                          91c0ecd7a45a9b6d6faf58423d1ff4ee

                          SHA1

                          89a3c4c111944bbbe83c2b9f50008879328e230a

                          SHA256

                          f12dfd638591c5444499e2325c59698554c7557880d722f8935cf2cdea46d111

                          SHA512

                          225452075fdf6a6302c18b9dd9eae818f2b14027d146dad9a4c58bb6c9dfae787c7caf3abaf5c29fe3a24010a81954088c3d9b2bf63a579d6df1841caf0b4dcc

                        • \Users\Admin\Pictures\Minor Policy\VcZi49u9l5hi9pgLQHuZV8jL.exe
                          Filesize

                          365KB

                          MD5

                          ce79479b60b270264c48818b633d1559

                          SHA1

                          7dcf699fa25c99960e36c9487066b4a3a5855a3a

                          SHA256

                          5258d88ffd8275a1c16739aa05eeb34dac82c3493f02033cb37f1d2fc985ad1e

                          SHA512

                          d3430038c42cb8cf96b48c8548ec9717ef2b8f5e3c5875d7f530cc4d40ce510d0bcabfa751232bad5c62224e09850bd95da26c2e57d65cc2af28694af653e412

                        • \Users\Admin\Pictures\Minor Policy\_x7oWmqzHOvTzdWHEIaz88wn.exe
                          Filesize

                          6.1MB

                          MD5

                          554c35e7f8372facb81013ed8a1abac7

                          SHA1

                          2f913331b0da061cced1ec22923dfcb7701661fa

                          SHA256

                          bcb26a341e64f4faf00f57e17955a576b6b41768b29a8d556a4f6d1f52320245

                          SHA512

                          dccda647c9b1634e031aba9f8b825d16356307eacc9b96f5d25f746b7a1fa6c82f527876b97d99750328633b01300b27ec24a9ffdaf2978abd4318d7889f8a4d

                        • \Users\Admin\Pictures\Minor Policy\fd5U6ERdmH2o3A926f763l_Z.exe
                          Filesize

                          234KB

                          MD5

                          cce8615f9e697a298760ab4843b960fd

                          SHA1

                          e814ec411a2fb2cfed2a491ecc04f874035e98fa

                          SHA256

                          466a20366f2f16813a26bdc6cce70a33d8c14bef069efbe24e0c028c9eb92c10

                          SHA512

                          4d7d99d910b0fddcf40f4099260163172eb05fe66fdcfec5935989a3746da2f560e57a92be375f73325caca167d5c8e6a73b52acec1f6812cadd5f044269c11e

                        • \Users\Admin\Pictures\Minor Policy\lw8iZMu72q42TwtsRQPEy8nW.exe
                          Filesize

                          3.5MB

                          MD5

                          c9dd331060bfb98acc554bdec8675e64

                          SHA1

                          7eff8060c1230bb1207c3452649d27ebc144eb63

                          SHA256

                          a43ba866355013dd2afd3c89ad4cd9427b7c209cae3c09c157843688cdf81e18

                          SHA512

                          82d72a0e3b40d5c5853844a82d50abc24626b3dea6609877bb5a349cc9d0e1ae54599b6cb623fc37596f30f6bc5f50b14a47e43afd38c351cb25d1f04d20efd8

                        • \Users\Admin\Pictures\Minor Policy\nvScBFy335J9UhFvU0vl3Ob6.exe
                          Filesize

                          2.1MB

                          MD5

                          a5a0ed639a5a6d8d31825db7f0c23fbc

                          SHA1

                          cfd83af729c7893622f62ed3580ed656a8518a3c

                          SHA256

                          18646ff39c91ed1a3495e580ae46ec36cef89bd362b645755ca645d238da9b2c

                          SHA512

                          029c510ae9ffd80576c34b59a0ae0364b80387c907b82eadd90eed7ef71371ef9e17c5b145851f742c3a7d0339dfa6382b0729c1c097e5da20bc8493abd67f9a

                        • \Users\Admin\Pictures\Minor Policy\psRH0RTLNuPeMuvVG85mZqCc.exe
                          Filesize

                          141KB

                          MD5

                          13fd3c9cd13274dc2c442e340ba6d42b

                          SHA1

                          57f9dd829648ac3c123d3922231b343a27e03166

                          SHA256

                          41686ad7861e37227ef1e467c075c844beee3e7c5fbdf9fbad39b9172f4a0c23

                          SHA512

                          fc8f2b13f618390d5176afc441f3ba2f1265f7706273507634fdc7c5b125f4f5d5fa2d3d6b41ac04c7c53fe36dda631214982b16836657e3605c8fbbbe69a682

                        • \Users\Admin\Pictures\Minor Policy\wiS84JlVrPkLah38t3JCpIqu.exe
                          Filesize

                          4.8MB

                          MD5

                          854d5dfe2d5193aa4150765c123df8ad

                          SHA1

                          1b21d80c4beb90b03d795cf11145619aeb3a4f37

                          SHA256

                          85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45

                          SHA512

                          48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc

                        • memory/324-87-0x00000000002EA000-0x00000000002FF000-memory.dmp
                          Filesize

                          84KB

                        • memory/324-104-0x0000000000400000-0x000000000083D000-memory.dmp
                          Filesize

                          4.2MB

                        • memory/324-85-0x0000000000400000-0x000000000083D000-memory.dmp
                          Filesize

                          4.2MB

                        • memory/324-63-0x0000000000000000-mapping.dmp
                        • memory/324-79-0x00000000002EA000-0x00000000002FF000-memory.dmp
                          Filesize

                          84KB

                        • memory/324-82-0x00000000001B0000-0x00000000001C3000-memory.dmp
                          Filesize

                          76KB

                        • memory/324-108-0x00000000002EA000-0x00000000002FF000-memory.dmp
                          Filesize

                          84KB

                        • memory/704-94-0x0000000000000000-mapping.dmp
                        • memory/800-83-0x0000000000000000-mapping.dmp
                        • memory/976-59-0x0000000001250000-0x0000000001E93000-memory.dmp
                          Filesize

                          12.3MB

                        • memory/976-65-0x00000000033A0000-0x00000000033C7000-memory.dmp
                          Filesize

                          156KB

                        • memory/976-54-0x0000000075891000-0x0000000075893000-memory.dmp
                          Filesize

                          8KB

                        • memory/976-77-0x0000000007500000-0x0000000007DAD000-memory.dmp
                          Filesize

                          8.7MB

                        • memory/976-58-0x0000000001250000-0x0000000001E93000-memory.dmp
                          Filesize

                          12.3MB

                        • memory/976-55-0x0000000001250000-0x0000000001E93000-memory.dmp
                          Filesize

                          12.3MB

                        • memory/1184-89-0x0000000000000000-mapping.dmp
                        • memory/1396-91-0x0000000000000000-mapping.dmp
                        • memory/1404-86-0x0000000000000000-mapping.dmp
                        • memory/1524-64-0x0000000000000000-mapping.dmp
                        • memory/1580-88-0x0000000000000000-mapping.dmp
                        • memory/1608-95-0x00000000002AA000-0x00000000002BF000-memory.dmp
                          Filesize

                          84KB

                        • memory/1608-103-0x0000000000400000-0x000000000083D000-memory.dmp
                          Filesize

                          4.2MB

                        • memory/1608-106-0x00000000002AA000-0x00000000002BF000-memory.dmp
                          Filesize

                          84KB

                        • memory/1628-99-0x0000000000089A6B-mapping.dmp
                        • memory/1628-98-0x0000000000080000-0x0000000000095000-memory.dmp
                          Filesize

                          84KB

                        • memory/1628-96-0x0000000000080000-0x0000000000095000-memory.dmp
                          Filesize

                          84KB

                        • memory/1628-107-0x0000000000080000-0x0000000000095000-memory.dmp
                          Filesize

                          84KB

                        • memory/1996-84-0x0000000000000000-mapping.dmp