Malware Analysis Report

2025-08-05 17:03

Sample ID 240107-ybat7sdfa8
Target a4ca303e0a9292f78b545bf698aa8c33.exe
SHA256 3e1682d2d6974e4284db9c5453e9bf08cab44d73cbb60682d2b9bcbcab9c75c3
Tags
tofsee evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3e1682d2d6974e4284db9c5453e9bf08cab44d73cbb60682d2b9bcbcab9c75c3

Threat Level: Known bad

The file a4ca303e0a9292f78b545bf698aa8c33.exe was found to be: Known bad.

Malicious Activity Summary

tofsee evasion persistence trojan

Tofsee

Creates new service(s)

Modifies Windows Firewall

Launches sc.exe

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-07 19:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-07 19:36

Reported

2024-01-07 19:38

Platform

win7-20231129-en

Max time kernel

1s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

Signatures

Tofsee

trojan tofsee

Creates new service(s)

persistence

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe

"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gzbzcbxu\

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\expljui.exe" C:\Windows\SysWOW64\gzbzcbxu\

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" create gzbzcbxu binPath= "C:\Windows\SysWOW64\gzbzcbxu\expljui.exe /d\"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe\"" type= own start= auto DisplayName= "wifi support"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" description gzbzcbxu "wifi internet conection"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" start gzbzcbxu

C:\Windows\SysWOW64\gzbzcbxu\expljui.exe

C:\Windows\SysWOW64\gzbzcbxu\expljui.exe /d"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

C:\Windows\SysWOW64\netsh.exe

"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 microsoft.com udp
US 20.112.250.133:80 microsoft.com tcp
US 8.8.8.8:53 defeatwax.ru udp
US 8.8.8.8:53 microsoft.com udp
US 8.8.8.8:53 microsoft-com.mail.protection.outlook.com udp
US 52.101.11.0:25 microsoft-com.mail.protection.outlook.com tcp
US 8.8.8.8:53 yahoo.com udp
US 8.8.8.8:53 mta6.am0.yahoodns.net udp
US 67.195.204.72:25 mta6.am0.yahoodns.net tcp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 smtp.google.com udp
US 108.177.127.26:25 smtp.google.com tcp
US 8.8.8.8:53 mail.ru udp
US 8.8.8.8:53 mxs.mail.ru udp
RU 94.100.180.31:25 mxs.mail.ru tcp
US 8.8.8.8:53 refabyd.info udp

Files

memory/3040-4-0x0000000000400000-0x000000000046E000-memory.dmp

memory/3040-3-0x00000000003A0000-0x00000000003B3000-memory.dmp

memory/3040-1-0x0000000000230000-0x0000000000330000-memory.dmp

memory/3040-8-0x0000000000400000-0x000000000046E000-memory.dmp

memory/2848-12-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2848-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2612-14-0x0000000000520000-0x0000000000620000-memory.dmp

memory/2848-20-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2848-19-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2848-18-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2612-16-0x0000000000400000-0x000000000046E000-memory.dmp

memory/2848-9-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2848-21-0x00000000000D0000-0x00000000000E5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-07 19:36

Reported

2024-01-07 19:39

Platform

win10v2004-20231215-en

Max time kernel

1s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

Signatures

Tofsee

trojan tofsee

Creates new service(s)

persistence

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe

"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vrsrbemn\

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jwnwobdx.exe" C:\Windows\SysWOW64\vrsrbemn\

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" create vrsrbemn binPath= "C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe /d\"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe\"" type= own start= auto DisplayName= "wifi support"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" description vrsrbemn "wifi internet conection"

C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe

C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe /d"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" start vrsrbemn

C:\Windows\SysWOW64\netsh.exe

"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 1.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 10.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
GB 87.248.205.0:80 tcp
RU 94.100.180.31:25 tcp
GB 96.17.179.50:80 tcp
GB 96.17.179.50:80 tcp
GB 96.17.179.50:80 tcp
US 204.79.197.200:443 tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
GB 96.17.179.50:80 tcp
GB 96.17.179.50:80 tcp
GB 96.17.179.50:80 tcp
GB 96.17.179.56:80 tcp
GB 96.17.179.56:80 tcp

Files

memory/3900-2-0x0000000000610000-0x0000000000623000-memory.dmp

memory/3900-4-0x0000000000400000-0x000000000046E000-memory.dmp

memory/3900-1-0x0000000000640000-0x0000000000740000-memory.dmp

memory/1280-8-0x0000000000740000-0x0000000000840000-memory.dmp

memory/4340-9-0x0000000000BE0000-0x0000000000BF5000-memory.dmp

memory/1280-10-0x0000000000400000-0x000000000046E000-memory.dmp

memory/4340-13-0x0000000000BE0000-0x0000000000BF5000-memory.dmp

memory/3900-14-0x0000000000400000-0x000000000046E000-memory.dmp

memory/4340-15-0x0000000000BE0000-0x0000000000BF5000-memory.dmp

memory/4340-16-0x0000000000BE0000-0x0000000000BF5000-memory.dmp

memory/3900-22-0x0000000000640000-0x0000000000740000-memory.dmp

memory/3900-23-0x0000000000610000-0x0000000000623000-memory.dmp

memory/4340-26-0x0000000000BE0000-0x0000000000BF5000-memory.dmp