Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 03:05

General

  • Target

    0c7824fd2d1717ce83f2c7a6522047c4.exe

  • Size

    12.7MB

  • MD5

    0c7824fd2d1717ce83f2c7a6522047c4

  • SHA1

    4849c18f94170bd876a2b0653763c04ebe61cfc4

  • SHA256

    59b5b9da2fdcee0b843246228a6eace2de8e5f20a82e2ed7df64e78f657f8772

  • SHA512

    eae3dd61afae33e900953fb0bf4f1e994c4df8bf2c3d7ed3581a8e06801857373bc2cad25a518825c62b829eb61cc286169bf3cefc43f9b818ab937b24e7cf94

  • SSDEEP

    24576:FjDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB5:Fnh

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe
    "C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jjlfqbwa\
      2⤵
        PID:2876
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\veqwgbxn.exe" C:\Windows\SysWOW64\jjlfqbwa\
        2⤵
          PID:1976
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create jjlfqbwa binPath= "C:\Windows\SysWOW64\jjlfqbwa\veqwgbxn.exe /d\"C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2900
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description jjlfqbwa "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2892
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start jjlfqbwa
          2⤵
          • Launches sc.exe
          PID:2800
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2764
      • C:\Windows\SysWOW64\jjlfqbwa\veqwgbxn.exe
        C:\Windows\SysWOW64\jjlfqbwa\veqwgbxn.exe /d"C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2064

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\veqwgbxn.exe

        Filesize

        7.1MB

        MD5

        383242f7506ff5be272b3c217f81b13c

        SHA1

        268bc1b5127682e81a87ea3fe3c6ffaa8f7799f9

        SHA256

        cd5b62034596bedf08475847d662fbdc46d59c1df5f564ede13590c88e2dbe82

        SHA512

        ea425aa686a5377f6a8402192f38943c480ec9a284da67cd1ddd55e894a5b3f2753fa51755762918f05d1263b83b23a355591bd81aaf1293996755473755a4c4

      • C:\Windows\SysWOW64\jjlfqbwa\veqwgbxn.exe

        Filesize

        14.7MB

        MD5

        dca37dde16242e40c49469b7222da0b0

        SHA1

        c1d7d634ab96161b756f402ece783fc3ebe035d6

        SHA256

        d7018631278ec4d8f52ec11bee997ebfe2e1427c06942d53e328ba776fda024f

        SHA512

        19f6b571ffa6ee3db371d432cca65560072c9713cfb0507b6801e3b4c46b74ce0ecc9d87c219f75873348506961c8bfc96a18fb07b788fc09862751dec7a487e

      • memory/2064-12-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2064-22-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2064-21-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2064-20-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2064-15-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2064-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2172-6-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/2172-7-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2172-1-0x0000000000630000-0x0000000000730000-memory.dmp

        Filesize

        1024KB

      • memory/2172-3-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/2172-2-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2748-11-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB

      • memory/2748-10-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/2748-16-0x0000000000400000-0x000000000046E000-memory.dmp

        Filesize

        440KB