Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 01:34

General

  • Target

    22fb4c623834ad8a3f602da708000647.exe

  • Size

    10.0MB

  • MD5

    22fb4c623834ad8a3f602da708000647

  • SHA1

    7386485a6086bf06ee7df34f6aa9c19a564749cf

  • SHA256

    508c827bc2401fa6a6b3ab11c6c151709b719df4f148edebee8aa1483d367f42

  • SHA512

    454f20708a71da5c851016c27600f55eb26192199cb312957dc33848fb13a5ec02ce67f9bfc2064785a800e2e0715e7cfa9cab262fd0142c6a0661bd2893b444

  • SSDEEP

    98304:I2UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU0:I

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe
    "C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yysixuew\
      2⤵
        PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\edtpwsx.exe" C:\Windows\SysWOW64\yysixuew\
        2⤵
          PID:2788
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create yysixuew binPath= "C:\Windows\SysWOW64\yysixuew\edtpwsx.exe /d\"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1932
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description yysixuew "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2332
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start yysixuew
          2⤵
          • Launches sc.exe
          PID:1396
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2644
      • C:\Windows\SysWOW64\yysixuew\edtpwsx.exe
        C:\Windows\SysWOW64\yysixuew\edtpwsx.exe /d"C:\Users\Admin\AppData\Local\Temp\22fb4c623834ad8a3f602da708000647.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\edtpwsx.exe

        Filesize

        432KB

        MD5

        e41afc6800f113729a94562c4d0f6076

        SHA1

        352c8380ea21350143f95d7cf6a354fab143847e

        SHA256

        967ce8c6549f50edeb7d6dd9f0b94735f7f5f3d788a74851fb708da26e4b27be

        SHA512

        74d21aca4a3a0f4d746841067105957961e0770659ba0aba07f5a9e7d34df2b89219ca1d1457be4e572e31d0b1f19cf5360619bbc69b0c70d3e2e297e8ca5ee3

      • C:\Windows\SysWOW64\yysixuew\edtpwsx.exe

        Filesize

        139KB

        MD5

        8d4dc0dec2a9878db5c502a868e7c847

        SHA1

        7fdc293f889b46449766b53f4c40d550cb4e2bf6

        SHA256

        33626cbbb64ced7b2c8229bcd0905980008f8744f15e20e3ed084bc14b66c90d

        SHA512

        1366617bbb3efdc332cc2636f73854376c3ca24ccd9c04fd5b5cae8575015f4a1b9480069270151633d358383874898025c4b8bb57f72441a6c42109079f928c

      • memory/2636-14-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-20-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-22-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-11-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-19-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-21-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2636-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2664-1-0x0000000000560000-0x0000000000660000-memory.dmp

        Filesize

        1024KB

      • memory/2664-17-0x0000000000400000-0x0000000000474000-memory.dmp

        Filesize

        464KB

      • memory/2664-3-0x0000000000400000-0x0000000000474000-memory.dmp

        Filesize

        464KB

      • memory/2664-2-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2680-15-0x0000000000400000-0x0000000000474000-memory.dmp

        Filesize

        464KB

      • memory/2680-8-0x0000000000590000-0x0000000000690000-memory.dmp

        Filesize

        1024KB

      • memory/2680-9-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2680-10-0x0000000000400000-0x0000000000474000-memory.dmp

        Filesize

        464KB