Analysis

  • max time kernel
    151s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 21:25

General

  • Target

    48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe

  • Size

    78KB

  • MD5

    bc1883b07b47423bd30645e54db4775c

  • SHA1

    2b96b8027083c5c44189ac03bafcc71df82a8ee1

  • SHA256

    48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

  • SHA512

    6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

  • SSDEEP

    1536:Kgzoa0BgdObHOjEb+96omECPxuXfDZEEkU3rHt81Hqf:Lzoa0yQnOhmEHCEkgry1H

Malware Config

Extracted

Family

tofsee

C2

185.4.227.76

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
    "C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
      "C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\cclkwivx.exe
        "C:\Users\Admin\cclkwivx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Users\Admin\cclkwivx.exe
          "C:\Users\Admin\cclkwivx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1308
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:1704
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\5343.bat" "
          3⤵
          • Deletes itself
          PID:396

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\5343.bat

            Filesize

            302B

            MD5

            bb034c8d8aa382466cf0e6587b229702

            SHA1

            d67b347b02eca51be13e0a6e09eedf4702f1933c

            SHA256

            eb42f40d7110c83317e5dcdaaa3694fd18619bbda0e0db28f03bb06240b5403b

            SHA512

            a8637d88052fdc154cc0b2be2486f6ac9de1f2a116d2dfe4604475f06f8f77dc9d1ac4b7539100b505b58115ea8da98a561f5fcacd72096f510d208425106283

          • C:\Users\Admin\cclkwivx.exe

            Filesize

            78KB

            MD5

            bc1883b07b47423bd30645e54db4775c

            SHA1

            2b96b8027083c5c44189ac03bafcc71df82a8ee1

            SHA256

            48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

            SHA512

            6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

          • C:\Users\Admin\cclkwivx.exe

            Filesize

            78KB

            MD5

            bc1883b07b47423bd30645e54db4775c

            SHA1

            2b96b8027083c5c44189ac03bafcc71df82a8ee1

            SHA256

            48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

            SHA512

            6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

          • C:\Users\Admin\cclkwivx.exe

            Filesize

            78KB

            MD5

            bc1883b07b47423bd30645e54db4775c

            SHA1

            2b96b8027083c5c44189ac03bafcc71df82a8ee1

            SHA256

            48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

            SHA512

            6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

          • \Users\Admin\cclkwivx.exe

            Filesize

            78KB

            MD5

            bc1883b07b47423bd30645e54db4775c

            SHA1

            2b96b8027083c5c44189ac03bafcc71df82a8ee1

            SHA256

            48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

            SHA512

            6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

          • \Users\Admin\cclkwivx.exe

            Filesize

            78KB

            MD5

            bc1883b07b47423bd30645e54db4775c

            SHA1

            2b96b8027083c5c44189ac03bafcc71df82a8ee1

            SHA256

            48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

            SHA512

            6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

          • memory/1172-57-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-65-0x0000000075A81000-0x0000000075A83000-memory.dmp

            Filesize

            8KB

          • memory/1172-55-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-94-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-54-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-61-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-60-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-66-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1172-59-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/1504-82-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/1692-63-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/1704-88-0x0000000000080000-0x0000000000091000-memory.dmp

            Filesize

            68KB

          • memory/1704-96-0x0000000000080000-0x0000000000091000-memory.dmp

            Filesize

            68KB

          • memory/1704-97-0x0000000000080000-0x0000000000091000-memory.dmp

            Filesize

            68KB