Analysis

  • max time kernel
    25s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 08:11

General

  • Target

    file.exe

  • Size

    147KB

  • MD5

    4eb62a4c6ef0b767b031754502a53d39

  • SHA1

    1031001a9972fadf5308ade23eaa3010a168c256

  • SHA256

    e8ee109e27398ee0a3db27958f243924c1bba9523919c375a49e606acc53cc54

  • SHA512

    d5765daac7a19123e203e0f7e90c2ed43e6aebb1246c5516b7141f526a007a3d06310e278ebf2e0dece2e0a0446a602fea22a537d4caa6f79aa2625e23859047

  • SSDEEP

    3072:YrEIFtEGVCjl65U0o000FBUFfmEeVdvw46LkxC:HZGVy0o000FBUYnvwL

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gvcemevb\
      2⤵
        PID:1708
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dfitoixy.exe" C:\Windows\SysWOW64\gvcemevb\
        2⤵
          PID:1748
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gvcemevb binPath= "C:\Windows\SysWOW64\gvcemevb\dfitoixy.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:268
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description gvcemevb "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2032
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start gvcemevb
          2⤵
          • Launches sc.exe
          PID:984
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:756
      • C:\Windows\SysWOW64\gvcemevb\dfitoixy.exe
        C:\Windows\SysWOW64\gvcemevb\dfitoixy.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
            PID:820

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        New Service

        1
        T1050

        Modify Existing Service

        1
        T1031

        Privilege Escalation

        New Service

        1
        T1050

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dfitoixy.exe
          Filesize

          11.8MB

          MD5

          1e2bfab709202d8ee92148cc2f2be4de

          SHA1

          81a3156b233df070c15a34d9253d3dbc7610c6d4

          SHA256

          e76798c4afe113996fe695aafff1c9f4765f07bd4fdde18060260296a557e141

          SHA512

          7b41a6531ab9433f54b9dea55ab67442adea1e103272d90e281b2b1724ccf87fb722157edf4c83e2ce3d3c61952b00b61e869b6e772f03e2607d0a0fc2079511

        • C:\Windows\SysWOW64\gvcemevb\dfitoixy.exe
          Filesize

          11.8MB

          MD5

          1e2bfab709202d8ee92148cc2f2be4de

          SHA1

          81a3156b233df070c15a34d9253d3dbc7610c6d4

          SHA256

          e76798c4afe113996fe695aafff1c9f4765f07bd4fdde18060260296a557e141

          SHA512

          7b41a6531ab9433f54b9dea55ab67442adea1e103272d90e281b2b1724ccf87fb722157edf4c83e2ce3d3c61952b00b61e869b6e772f03e2607d0a0fc2079511

        • memory/268-61-0x0000000000000000-mapping.dmp
        • memory/576-75-0x0000000000BAB000-0x0000000000BBC000-memory.dmp
          Filesize

          68KB

        • memory/576-74-0x0000000000400000-0x0000000000AD6000-memory.dmp
          Filesize

          6.8MB

        • memory/756-65-0x0000000000000000-mapping.dmp
        • memory/820-72-0x0000000000089A6B-mapping.dmp
        • memory/820-71-0x0000000000080000-0x0000000000095000-memory.dmp
          Filesize

          84KB

        • memory/820-69-0x0000000000080000-0x0000000000095000-memory.dmp
          Filesize

          84KB

        • memory/984-63-0x0000000000000000-mapping.dmp
        • memory/1708-55-0x0000000000000000-mapping.dmp
        • memory/1748-59-0x0000000000000000-mapping.dmp
        • memory/2032-62-0x0000000000000000-mapping.dmp
        • memory/2040-68-0x0000000000400000-0x0000000000AD6000-memory.dmp
          Filesize

          6.8MB

        • memory/2040-67-0x0000000000BEB000-0x0000000000BFC000-memory.dmp
          Filesize

          68KB

        • memory/2040-54-0x00000000762D1000-0x00000000762D3000-memory.dmp
          Filesize

          8KB

        • memory/2040-58-0x0000000000400000-0x0000000000AD6000-memory.dmp
          Filesize

          6.8MB

        • memory/2040-56-0x0000000000BEB000-0x0000000000BFC000-memory.dmp
          Filesize

          68KB

        • memory/2040-57-0x0000000000220000-0x0000000000233000-memory.dmp
          Filesize

          76KB