Analysis

  • max time kernel
    34s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:50

General

  • Target

    fdf2c167e3038cd40538ca5a83bddd48.exe

  • Size

    14.1MB

  • MD5

    fdf2c167e3038cd40538ca5a83bddd48

  • SHA1

    ac0c3a598aa28568a5d28d1fc262207f0345c5bc

  • SHA256

    b3849e6d7b97c3d7e4f1668975783d4432a38b6d4f0c5970d9206871de2caa82

  • SHA512

    7cc57649f935d385403e1202c6774b6eda4f79f80aa07cfdd49924368a201d5f0ad3680f0086a912495b7b0db3afea2240d75a1569af99ff8676cdc4c6fb24cb

  • SSDEEP

    6144:Li0TTXfKNnKjmm+AJl6MBK0/etgnc0ArFuyXgWNInP:lKNKjmm+AJlznetgABufeI

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdf2c167e3038cd40538ca5a83bddd48.exe
    "C:\Users\Admin\AppData\Local\Temp\fdf2c167e3038cd40538ca5a83bddd48.exe"
    1⤵
      PID:452
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\udjimglr\
        2⤵
          PID:5032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oprsmpkc.exe" C:\Windows\SysWOW64\udjimglr\
          2⤵
            PID:4580
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create udjimglr binPath= "C:\Windows\SysWOW64\udjimglr\oprsmpkc.exe /d\"C:\Users\Admin\AppData\Local\Temp\fdf2c167e3038cd40538ca5a83bddd48.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
            • Launches sc.exe
            PID:2616
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description udjimglr "wifi internet conection"
            2⤵
            • Launches sc.exe
            PID:2508
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start udjimglr
            2⤵
            • Launches sc.exe
            PID:1888
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            2⤵
            • Modifies Windows Firewall
            PID:2592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 888
            2⤵
            • Program crash
            PID:2304
        • C:\Windows\SysWOW64\udjimglr\oprsmpkc.exe
          C:\Windows\SysWOW64\udjimglr\oprsmpkc.exe /d"C:\Users\Admin\AppData\Local\Temp\fdf2c167e3038cd40538ca5a83bddd48.exe"
          1⤵
            PID:2060
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              2⤵
                PID:2700
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 536
                2⤵
                • Program crash
                PID:2136
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 452 -ip 452
              1⤵
                PID:4456
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2060 -ip 2060
                1⤵
                  PID:1108

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/452-10-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/452-11-0x00000000024F0000-0x0000000002503000-memory.dmp

                  Filesize

                  76KB

                • memory/452-3-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/452-5-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/452-7-0x00000000008F0000-0x00000000009F0000-memory.dmp

                  Filesize

                  1024KB

                • memory/452-6-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/452-2-0x00000000024F0000-0x0000000002503000-memory.dmp

                  Filesize

                  76KB

                • memory/452-1-0x00000000008F0000-0x00000000009F0000-memory.dmp

                  Filesize

                  1024KB

                • memory/2060-20-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/2060-16-0x0000000000400000-0x00000000008E9000-memory.dmp

                  Filesize

                  4.9MB

                • memory/2060-13-0x0000000000A40000-0x0000000000B40000-memory.dmp

                  Filesize

                  1024KB

                • memory/2700-14-0x0000000000110000-0x0000000000125000-memory.dmp

                  Filesize

                  84KB

                • memory/2700-21-0x0000000000110000-0x0000000000125000-memory.dmp

                  Filesize

                  84KB

                • memory/2700-19-0x0000000000110000-0x0000000000125000-memory.dmp

                  Filesize

                  84KB

                • memory/2700-22-0x0000000000110000-0x0000000000125000-memory.dmp

                  Filesize

                  84KB