Analysis

  • max time kernel
    146s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2023 22:32

General

  • Target

    file.exe

  • Size

    299KB

  • MD5

    f4d9f3f1009be26ad902f44ac9082c4e

  • SHA1

    9814e5e8e6ce762b7e0544f8f44d1eddd9658415

  • SHA256

    15188d63048c1646ce4b4070eb5ff19ed65e9e63af1c884e3b314d5536bb695a

  • SHA512

    c09ec10ea165108655f52c1e001d37777c66ff205cd8936c79f5991e838ec29cc76d0ad8c7b7c129ef3fa41007559c3869d7483f5ae3fbb52d0ffe60a95208c6

  • SSDEEP

    6144:COUmLTe6RYq4N306/C/ryGOhXDuQj96oah:CBmvjYjNda2GOhXDljD

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pggguiag\
      2⤵
        PID:3424
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ndfsjbm.exe" C:\Windows\SysWOW64\pggguiag\
        2⤵
          PID:4588
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create pggguiag binPath= "C:\Windows\SysWOW64\pggguiag\ndfsjbm.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1660
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description pggguiag "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4376
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start pggguiag
          2⤵
          • Launches sc.exe
          PID:1920
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:4192
      • C:\Windows\SysWOW64\pggguiag\ndfsjbm.exe
        C:\Windows\SysWOW64\pggguiag\ndfsjbm.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4080
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:5000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ndfsjbm.exe

        Filesize

        14.7MB

        MD5

        628aaa9ac5c201e7fef243bf1ca6ac72

        SHA1

        6bc2d0ec4ce4f456523613a9906beb8d505ee55c

        SHA256

        44fbbcc419c465207c45d37d77ce84317558f6fe484c5ac98dd56f39adf708a8

        SHA512

        0d1d6429389cda964120a4ba1dbf19568eaf5131da4a055dd515617256b6d0bd27a042955d80ccde93d4be59a44adfef8152d92c2a356f168a19998461c463dc

      • C:\Windows\SysWOW64\pggguiag\ndfsjbm.exe

        Filesize

        14.7MB

        MD5

        628aaa9ac5c201e7fef243bf1ca6ac72

        SHA1

        6bc2d0ec4ce4f456523613a9906beb8d505ee55c

        SHA256

        44fbbcc419c465207c45d37d77ce84317558f6fe484c5ac98dd56f39adf708a8

        SHA512

        0d1d6429389cda964120a4ba1dbf19568eaf5131da4a055dd515617256b6d0bd27a042955d80ccde93d4be59a44adfef8152d92c2a356f168a19998461c463dc

      • memory/1660-139-0x0000000000000000-mapping.dmp

      • memory/1920-141-0x0000000000000000-mapping.dmp

      • memory/3424-136-0x0000000000000000-mapping.dmp

      • memory/4080-145-0x00000000005B9000-0x00000000005CE000-memory.dmp

        Filesize

        84KB

      • memory/4080-149-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/4080-151-0x00000000005B9000-0x00000000005CE000-memory.dmp

        Filesize

        84KB

      • memory/4192-143-0x0000000000000000-mapping.dmp

      • memory/4376-140-0x0000000000000000-mapping.dmp

      • memory/4588-137-0x0000000000000000-mapping.dmp

      • memory/4872-134-0x0000000002210000-0x0000000002223000-memory.dmp

        Filesize

        76KB

      • memory/4872-133-0x00000000004D0000-0x00000000005D0000-memory.dmp

        Filesize

        1024KB

      • memory/4872-144-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/4872-135-0x0000000000400000-0x00000000004C8000-memory.dmp

        Filesize

        800KB

      • memory/5000-146-0x0000000000000000-mapping.dmp

      • memory/5000-147-0x0000000000CD0000-0x0000000000CE5000-memory.dmp

        Filesize

        84KB

      • memory/5000-152-0x0000000000CD0000-0x0000000000CE5000-memory.dmp

        Filesize

        84KB

      • memory/5000-153-0x0000000000CD0000-0x0000000000CE5000-memory.dmp

        Filesize

        84KB