Analysis

  • max time kernel
    184s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 22:30

General

  • Target

    05a2ffa77432d48e8dffb43a9e201c28.exe

  • Size

    10.0MB

  • MD5

    05a2ffa77432d48e8dffb43a9e201c28

  • SHA1

    63cf6faadb2815d4eaaa6fa82f8e561d92dfa487

  • SHA256

    9c04dffcd40004b5474f4827f6eac7537f8a049eee351a6866206943c55e7513

  • SHA512

    c15e73e89f936f0d28b0ed32a0a09cab11f6957d566da281cd903f80db94200e713ea09373bb1204d20396e1679a1ea6adf7a238d9ad925806ee01f0a70706d4

  • SSDEEP

    49152:UQsPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:UQ

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe
    "C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\akidlrup\
      2⤵
        PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ehppnlpy.exe" C:\Windows\SysWOW64\akidlrup\
        2⤵
          PID:380
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create akidlrup binPath= "C:\Windows\SysWOW64\akidlrup\ehppnlpy.exe /d\"C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:912
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description akidlrup "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4456
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start akidlrup
          2⤵
          • Launches sc.exe
          PID:4608
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:4444
      • C:\Windows\SysWOW64\akidlrup\ehppnlpy.exe
        C:\Windows\SysWOW64\akidlrup\ehppnlpy.exe /d"C:\Users\Admin\AppData\Local\Temp\05a2ffa77432d48e8dffb43a9e201c28.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:1248

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\ehppnlpy.exe

              Filesize

              806KB

              MD5

              51f5f71e34f7beb35249357f45757739

              SHA1

              3558ec63395bd5c5a99aec9e97f810f8996dd7ff

              SHA256

              0075a33191f9e64b371e380b6268727919874194dd8fb53cf692d3f5cf46c3d0

              SHA512

              ce96f37551ad276e00820bdad72d1007b913baea56bbbdee25f1f431f2c1c9e1265d7dd7657e4355107eca145ea42420e7dfaa218ca659f8070fc0c1cd76fe13

            • C:\Windows\SysWOW64\akidlrup\ehppnlpy.exe

              Filesize

              186KB

              MD5

              b0944cb0e9fa53e55b5a8544a47de770

              SHA1

              353befa735f196ac3f870a7c43f363cdf86af55c

              SHA256

              18bd23a2021b6675ab4f97173b9884f8b49f12d754ddbfc556a6feaf9928f94b

              SHA512

              b6f2db38e3b45b9a2cfb5cd5292fcc50e41146436e5dfa994568cd17f5f84b8d440c69f286774c6bfee95ad967ac3096bdf166b7cdac197df9ccefc444df08ce

            • memory/1248-16-0x00000000007A0000-0x00000000007B5000-memory.dmp

              Filesize

              84KB

            • memory/1248-11-0x00000000007A0000-0x00000000007B5000-memory.dmp

              Filesize

              84KB

            • memory/1248-17-0x00000000007A0000-0x00000000007B5000-memory.dmp

              Filesize

              84KB

            • memory/1248-18-0x00000000007A0000-0x00000000007B5000-memory.dmp

              Filesize

              84KB

            • memory/4020-7-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB

            • memory/4020-10-0x0000000000EB0000-0x0000000000FB0000-memory.dmp

              Filesize

              1024KB

            • memory/4020-15-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB

            • memory/4020-13-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB

            • memory/4980-4-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB

            • memory/4980-2-0x0000000000F90000-0x0000000001090000-memory.dmp

              Filesize

              1024KB

            • memory/4980-8-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB

            • memory/4980-0-0x0000000000400000-0x0000000000C56000-memory.dmp

              Filesize

              8.3MB