Analysis

  • max time kernel
    194s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:31

General

  • Target

    fcf25c18735685029b0faef2d1cb7850.exe

  • Size

    11.8MB

  • MD5

    fcf25c18735685029b0faef2d1cb7850

  • SHA1

    71258bc2fe3f91053a9b5756bfe3d94a64196f0d

  • SHA256

    5e3b2944312061327384f31234128bb4ddba910790f8a529f10b40de4330446d

  • SHA512

    13cd2d5029bb63b1fd19f0ef79fa2de728fe2e55d6ce76ed8337d0be7c868f0c29edffbe8b9c6cbd25c604a41d9b0e22b27466bb94ffd1a24f0e9c14514a9415

  • SSDEEP

    49152:CGvEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE:CG

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcf25c18735685029b0faef2d1cb7850.exe
    "C:\Users\Admin\AppData\Local\Temp\fcf25c18735685029b0faef2d1cb7850.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\shgflufm\
      2⤵
        PID:1176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hnyjbqkw.exe" C:\Windows\SysWOW64\shgflufm\
        2⤵
          PID:4200
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create shgflufm binPath= "C:\Windows\SysWOW64\shgflufm\hnyjbqkw.exe /d\"C:\Users\Admin\AppData\Local\Temp\fcf25c18735685029b0faef2d1cb7850.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:4064
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description shgflufm "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4336
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start shgflufm
          2⤵
          • Launches sc.exe
          PID:3148
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1304
          2⤵
          • Program crash
          PID:416
      • C:\Windows\SysWOW64\shgflufm\hnyjbqkw.exe
        C:\Windows\SysWOW64\shgflufm\hnyjbqkw.exe /d"C:\Users\Admin\AppData\Local\Temp\fcf25c18735685029b0faef2d1cb7850.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 516
          2⤵
          • Program crash
          PID:4744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4808 -ip 4808
        1⤵
          PID:2720
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5084 -ip 5084
          1⤵
            PID:1724

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\hnyjbqkw.exe

                  Filesize

                  3.4MB

                  MD5

                  b352d64f32e637b7453cdceab7c893d5

                  SHA1

                  1a18a019d3f26f56a96063cb7a5ff157e6462d07

                  SHA256

                  89a435e96fba9f4e2e7dd8af49fa804f60722696898e93f0c3dc85d84271453e

                  SHA512

                  3329e0dea2436865d565d8ea372f49946cae1dd0e06777b82c322db40c548cdb8831e1e5afd1f5ed0b1c7eba119e313ad2e6a49a03858384f264291bd31a638e

                • C:\Windows\SysWOW64\shgflufm\hnyjbqkw.exe

                  Filesize

                  2.2MB

                  MD5

                  613c09b686e1253d1952f2801d5d6601

                  SHA1

                  dbb7f45c0e7861cb64849d210ab6d75e500b070e

                  SHA256

                  836332934a026d44dcbd854be268c42cfd2168ffbe2b222ba51a68bc0b5fd5f8

                  SHA512

                  91913d91f1870978d775e09057c0480ad69b7163e5577cfb4b1b7296a5d929157f46281c7c1f2394c2e49ad5616d3088eebb28e37446d8320534164bbdeacdff

                • memory/452-17-0x0000000000EF0000-0x0000000000F05000-memory.dmp

                  Filesize

                  84KB

                • memory/452-13-0x0000000000EF0000-0x0000000000F05000-memory.dmp

                  Filesize

                  84KB

                • memory/452-20-0x0000000000EF0000-0x0000000000F05000-memory.dmp

                  Filesize

                  84KB

                • memory/452-19-0x0000000000EF0000-0x0000000000F05000-memory.dmp

                  Filesize

                  84KB

                • memory/452-18-0x0000000000EF0000-0x0000000000F05000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-1-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4808-4-0x0000000000400000-0x0000000000C14000-memory.dmp

                  Filesize

                  8.1MB

                • memory/4808-8-0x0000000000CC0000-0x0000000000CD3000-memory.dmp

                  Filesize

                  76KB

                • memory/4808-7-0x0000000000400000-0x0000000000C14000-memory.dmp

                  Filesize

                  8.1MB

                • memory/4808-2-0x0000000000CC0000-0x0000000000CD3000-memory.dmp

                  Filesize

                  76KB

                • memory/5084-11-0x0000000000400000-0x0000000000C14000-memory.dmp

                  Filesize

                  8.1MB

                • memory/5084-12-0x0000000000400000-0x0000000000C14000-memory.dmp

                  Filesize

                  8.1MB

                • memory/5084-10-0x0000000000F50000-0x0000000001050000-memory.dmp

                  Filesize

                  1024KB

                • memory/5084-14-0x0000000000400000-0x0000000000C14000-memory.dmp

                  Filesize

                  8.1MB