Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 21:25

General

  • Target

    48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe

  • Size

    78KB

  • MD5

    bc1883b07b47423bd30645e54db4775c

  • SHA1

    2b96b8027083c5c44189ac03bafcc71df82a8ee1

  • SHA256

    48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

  • SHA512

    6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

  • SSDEEP

    1536:Kgzoa0BgdObHOjEb+96omECPxuXfDZEEkU3rHt81Hqf:Lzoa0yQnOhmEHCEkgry1H

Malware Config

Extracted

Family

tofsee

C2

185.4.227.76

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
    "C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
      "C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Users\Admin\wwfeqcpr.exe
        "C:\Users\Admin\wwfeqcpr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4768
        • C:\Users\Admin\wwfeqcpr.exe
          "C:\Users\Admin\wwfeqcpr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:4920
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 192
                6⤵
                • Program crash
                PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3637.bat" "
          3⤵
            PID:2468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4920 -ip 4920
        1⤵
          PID:4628

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3637.bat

                Filesize

                302B

                MD5

                bb034c8d8aa382466cf0e6587b229702

                SHA1

                d67b347b02eca51be13e0a6e09eedf4702f1933c

                SHA256

                eb42f40d7110c83317e5dcdaaa3694fd18619bbda0e0db28f03bb06240b5403b

                SHA512

                a8637d88052fdc154cc0b2be2486f6ac9de1f2a116d2dfe4604475f06f8f77dc9d1ac4b7539100b505b58115ea8da98a561f5fcacd72096f510d208425106283

              • C:\Users\Admin\wwfeqcpr.exe

                Filesize

                78KB

                MD5

                bc1883b07b47423bd30645e54db4775c

                SHA1

                2b96b8027083c5c44189ac03bafcc71df82a8ee1

                SHA256

                48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

                SHA512

                6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

              • C:\Users\Admin\wwfeqcpr.exe

                Filesize

                78KB

                MD5

                bc1883b07b47423bd30645e54db4775c

                SHA1

                2b96b8027083c5c44189ac03bafcc71df82a8ee1

                SHA256

                48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

                SHA512

                6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

              • C:\Users\Admin\wwfeqcpr.exe

                Filesize

                78KB

                MD5

                bc1883b07b47423bd30645e54db4775c

                SHA1

                2b96b8027083c5c44189ac03bafcc71df82a8ee1

                SHA256

                48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8

                SHA512

                6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e

              • memory/3672-137-0x0000000000400000-0x0000000000411000-memory.dmp

                Filesize

                68KB

              • memory/3672-141-0x0000000000400000-0x0000000000411000-memory.dmp

                Filesize

                68KB

              • memory/3672-134-0x0000000000400000-0x0000000000411000-memory.dmp

                Filesize

                68KB

              • memory/4364-132-0x0000000000400000-0x000000000041A000-memory.dmp

                Filesize

                104KB

              • memory/4364-136-0x0000000000400000-0x000000000041A000-memory.dmp

                Filesize

                104KB

              • memory/4768-142-0x0000000000400000-0x000000000041A000-memory.dmp

                Filesize

                104KB

              • memory/4768-146-0x0000000000400000-0x000000000041A000-memory.dmp

                Filesize

                104KB

              • memory/4920-150-0x0000000000470000-0x0000000000481000-memory.dmp

                Filesize

                68KB

              • memory/4920-155-0x0000000000470000-0x0000000000481000-memory.dmp

                Filesize

                68KB