Analysis

  • max time kernel
    50s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2023 17:15

General

  • Target

    78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe

  • Size

    154KB

  • MD5

    5e867ae4a78726523d91eaea386fce6d

  • SHA1

    c9ee64774b15ada9cbd52f88bb47057647978fac

  • SHA256

    78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d

  • SHA512

    74d7fbb706839e32432abb761dbb02dd0e3d85e8f2f22412549d379f42027a99c4af39febb448b150e6d701d25fab4be698eb9439bcb5a247659dbf888bbb344

  • SSDEEP

    1536:n9Hnxm+W0eDrB6CjnMQSoWp0MYS3+MpHiCUywyJqbgoVtcdnA+QA5Hs5W0+MWVO4:npQDBDjnLSZp3+6iCUyw6oVtrA5He1

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe
    "C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\huagtpqe\
      2⤵
        PID:2008
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gtjsdqdx.exe" C:\Windows\SysWOW64\huagtpqe\
        2⤵
          PID:1540
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create huagtpqe binPath= "C:\Windows\SysWOW64\huagtpqe\gtjsdqdx.exe /d\"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:472
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description huagtpqe "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1916
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start huagtpqe
          2⤵
          • Launches sc.exe
          PID:1820
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:1196
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:588
        • C:\Windows\SysWOW64\huagtpqe\gtjsdqdx.exe
          C:\Windows\SysWOW64\huagtpqe\gtjsdqdx.exe /d"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            2⤵
            • Sets service image path in registry
            • Deletes itself
            PID:1120
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x52c
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:632

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        New Service

        1
        T1050

        Modify Existing Service

        1
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Privilege Escalation

        New Service

        1
        T1050

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gtjsdqdx.exe
          Filesize

          14.1MB

          MD5

          6f87bb2bd16eee83b87840368166bcd9

          SHA1

          4b2c9bd91380d6712aaace1240dd60f8ac703fbf

          SHA256

          6cf4c7502d099f53f0db3900ca17972a265fea47453f076a17bbf88c754276f1

          SHA512

          bd6e28217067612307820b8a6d94003c06945c78b2ea6c074933ee9e53313623f8a8d7882f8fe58d40ae468d624bf1a8f48393153dace575c81dcfabf6a88319

        • C:\Windows\SysWOW64\huagtpqe\gtjsdqdx.exe
          Filesize

          14.1MB

          MD5

          6f87bb2bd16eee83b87840368166bcd9

          SHA1

          4b2c9bd91380d6712aaace1240dd60f8ac703fbf

          SHA256

          6cf4c7502d099f53f0db3900ca17972a265fea47453f076a17bbf88c754276f1

          SHA512

          bd6e28217067612307820b8a6d94003c06945c78b2ea6c074933ee9e53313623f8a8d7882f8fe58d40ae468d624bf1a8f48393153dace575c81dcfabf6a88319

        • memory/1120-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/1120-63-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1120-73-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1120-72-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1120-71-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1120-70-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1120-65-0x00000000000D0000-0x00000000000E5000-memory.dmp
          Filesize

          84KB

        • memory/1992-68-0x00000000050E0000-0x00000000050F1000-memory.dmp
          Filesize

          68KB

        • memory/1992-66-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1992-62-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/2000-54-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/2000-56-0x0000000000260000-0x0000000000261000-memory.dmp
          Filesize

          4KB

        • memory/2000-61-0x00000000050E0000-0x00000000050F1000-memory.dmp
          Filesize

          68KB

        • memory/2000-60-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/2000-55-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB