Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 03:43

General

  • Target

    26c40137d44baffaed0feef784b5a6bd.exe

  • Size

    14.7MB

  • MD5

    26c40137d44baffaed0feef784b5a6bd

  • SHA1

    cbd0f74afe260641d62a4020e6d3f00d56c14e75

  • SHA256

    5363de7557a8cea70d59831cdeb9f42268f0d8628168c343bcd8f09851d0b6c2

  • SHA512

    12f9c4a04590c72c75796eebcd06e7f8f7c94bd5495c57dee75ab9abbf6d3c8bca8be8edb4d86e2a17cff88116c4449fba491b201cf194859c259f75ae98b4c3

  • SSDEEP

    98304:Bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffn:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe
    "C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hvlzqgqb\
      2⤵
        PID:1384
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bnoidzax.exe" C:\Windows\SysWOW64\hvlzqgqb\
        2⤵
          PID:4792
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create hvlzqgqb binPath= "C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe /d\"C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:3020
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description hvlzqgqb "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4676
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start hvlzqgqb
          2⤵
          • Launches sc.exe
          PID:2204
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:444
      • C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe
        C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe /d"C:\Users\Admin\AppData\Local\Temp\26c40137d44baffaed0feef784b5a6bd.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:1472

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\bnoidzax.exe

        Filesize

        1.4MB

        MD5

        c6726c91a1c7061468baa99d3d91eec9

        SHA1

        a5df3db886c055a446b1b4df06df8daa78823e3d

        SHA256

        af2526d928d2b8ce0436d0586968512f6666f2b6f629a7828cefc28e48053d8a

        SHA512

        7918fdf85972f4778e0da7ec11247f14874afb5f857822929b2d1db40a3a0fe947252fb62ac63e45bf2a1a27a5e0b72d3d0efd939b68fa0496dcba591622d92d

      • C:\Windows\SysWOW64\hvlzqgqb\bnoidzax.exe

        Filesize

        1.3MB

        MD5

        7770dad781f42d9baf4a332be80348c0

        SHA1

        2315b07fbde7dc3559360427193c3347888e6753

        SHA256

        698ecc11657305a7dcd30c8a7ab92e4613be779da4b698cf67104770f5ab3bf8

        SHA512

        27e0a5f3df0da8bd20c5d7210aef7473003a92438cb164fecefcf160e6f7f4918731e7f2333e98862b8c887f7f512228edeaaacfb71e3e8b78a176dbbabde2b3

      • memory/912-6-0x0000000000D90000-0x0000000000D91000-memory.dmp

        Filesize

        4KB

      • memory/912-9-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1472-12-0x00000000006A0000-0x00000000006B5000-memory.dmp

        Filesize

        84KB

      • memory/1472-8-0x00000000006A0000-0x00000000006B5000-memory.dmp

        Filesize

        84KB

      • memory/1472-15-0x00000000006A0000-0x00000000006B5000-memory.dmp

        Filesize

        84KB

      • memory/1472-14-0x00000000006A0000-0x00000000006B5000-memory.dmp

        Filesize

        84KB

      • memory/1472-16-0x00000000006A0000-0x00000000006B5000-memory.dmp

        Filesize

        84KB

      • memory/3768-2-0x00000000009D0000-0x00000000009D1000-memory.dmp

        Filesize

        4KB

      • memory/3768-0-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

        Filesize

        4KB

      • memory/3768-1-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/3768-13-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB