Analysis

  • max time kernel
    455s
  • max time network
    453s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2023 17:17

General

  • Target

    78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe

  • Size

    154KB

  • MD5

    5e867ae4a78726523d91eaea386fce6d

  • SHA1

    c9ee64774b15ada9cbd52f88bb47057647978fac

  • SHA256

    78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d

  • SHA512

    74d7fbb706839e32432abb761dbb02dd0e3d85e8f2f22412549d379f42027a99c4af39febb448b150e6d701d25fab4be698eb9439bcb5a247659dbf888bbb344

  • SSDEEP

    1536:n9Hnxm+W0eDrB6CjnMQSoWp0MYS3+MpHiCUywyJqbgoVtcdnA+QA5Hs5W0+MWVO4:npQDBDjnLSZp3+6iCUyw6oVtrA5He1

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe
    "C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rzaouvme\
      2⤵
        PID:1932
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\utduombn.exe" C:\Windows\SysWOW64\rzaouvme\
        2⤵
          PID:696
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create rzaouvme binPath= "C:\Windows\SysWOW64\rzaouvme\utduombn.exe /d\"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:972
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description rzaouvme "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:684
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start rzaouvme
          2⤵
          • Launches sc.exe
          PID:1672
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:960
      • C:\Windows\SysWOW64\rzaouvme\utduombn.exe
        C:\Windows\SysWOW64\rzaouvme\utduombn.exe /d"C:\Users\Admin\AppData\Local\Temp\78ca5753c7f93fe3ff553ae23fb87395c36a791b61952eabf6b9d96e59c7862d.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:1764
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:1812
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0xc4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:872
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x56c
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1220

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        New Service

        1
        T1050

        Modify Existing Service

        1
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Privilege Escalation

        New Service

        1
        T1050

        Defense Evasion

        Disabling Security Tools

        1
        T1089

        Modify Registry

        2
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\utduombn.exe
          Filesize

          12.1MB

          MD5

          7532276222201e5cb12df7562cf062aa

          SHA1

          fda6d186cc9e508c007aa6f935f2944fc3af4c34

          SHA256

          96a1acae602bd3e1a1a114035f7dcc788b9bbf5e2f87b9d8bc5bc65c8f9dcb29

          SHA512

          d28a972a91dba87644a675d5f4b88cb1a197b1be0138103a00147fe9825640895592ce0ce2c48ca78a3e4e53aa968f6b084347e49d7dfa9b79fe29ee26fcc6d8

        • C:\Windows\SysWOW64\rzaouvme\utduombn.exe
          Filesize

          12.1MB

          MD5

          7532276222201e5cb12df7562cf062aa

          SHA1

          fda6d186cc9e508c007aa6f935f2944fc3af4c34

          SHA256

          96a1acae602bd3e1a1a114035f7dcc788b9bbf5e2f87b9d8bc5bc65c8f9dcb29

          SHA512

          d28a972a91dba87644a675d5f4b88cb1a197b1be0138103a00147fe9825640895592ce0ce2c48ca78a3e4e53aa968f6b084347e49d7dfa9b79fe29ee26fcc6d8

        • memory/1764-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/1764-63-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1764-73-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1764-72-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1764-71-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1764-70-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1764-65-0x00000000000C0000-0x00000000000D5000-memory.dmp
          Filesize

          84KB

        • memory/1960-68-0x00000000050E0000-0x00000000050F1000-memory.dmp
          Filesize

          68KB

        • memory/1960-66-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1960-60-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1972-54-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1972-57-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/1972-61-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1972-62-0x00000000050E0000-0x00000000050F1000-memory.dmp
          Filesize

          68KB

        • memory/1972-56-0x0000000000230000-0x0000000000231000-memory.dmp
          Filesize

          4KB