Analysis Overview
SHA256
3e1682d2d6974e4284db9c5453e9bf08cab44d73cbb60682d2b9bcbcab9c75c3
Threat Level: Known bad
The file a4ca303e0a9292f78b545bf698aa8c33.exe was found to be: Known bad.
Malicious Activity Summary
Tofsee
Creates new service(s)
Modifies Windows Firewall
Launches sc.exe
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:36
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:36
Reported
2024-01-07 19:38
Platform
win7-20231129-en
Max time kernel
1s
Max time network
146s
Command Line
Signatures
Tofsee
Creates new service(s)
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3040 wrote to memory of 2184 | N/A | C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 3040 wrote to memory of 2184 | N/A | C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 3040 wrote to memory of 2184 | N/A | C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 3040 wrote to memory of 2184 | N/A | C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe | C:\Windows\SysWOW64\cmd.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe
"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gzbzcbxu\
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\expljui.exe" C:\Windows\SysWOW64\gzbzcbxu\
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" create gzbzcbxu binPath= "C:\Windows\SysWOW64\gzbzcbxu\expljui.exe /d\"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe\"" type= own start= auto DisplayName= "wifi support"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" description gzbzcbxu "wifi internet conection"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" start gzbzcbxu
C:\Windows\SysWOW64\gzbzcbxu\expljui.exe
C:\Windows\SysWOW64\gzbzcbxu\expljui.exe /d"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
C:\Windows\SysWOW64\svchost.exe
svchost.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 20.112.250.133:80 | microsoft.com | tcp |
| US | 8.8.8.8:53 | defeatwax.ru | udp |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 8.8.8.8:53 | microsoft-com.mail.protection.outlook.com | udp |
| US | 52.101.11.0:25 | microsoft-com.mail.protection.outlook.com | tcp |
| US | 8.8.8.8:53 | yahoo.com | udp |
| US | 8.8.8.8:53 | mta6.am0.yahoodns.net | udp |
| US | 67.195.204.72:25 | mta6.am0.yahoodns.net | tcp |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | smtp.google.com | udp |
| US | 108.177.127.26:25 | smtp.google.com | tcp |
| US | 8.8.8.8:53 | mail.ru | udp |
| US | 8.8.8.8:53 | mxs.mail.ru | udp |
| RU | 94.100.180.31:25 | mxs.mail.ru | tcp |
| US | 8.8.8.8:53 | refabyd.info | udp |
Files
memory/3040-4-0x0000000000400000-0x000000000046E000-memory.dmp
memory/3040-3-0x00000000003A0000-0x00000000003B3000-memory.dmp
memory/3040-1-0x0000000000230000-0x0000000000330000-memory.dmp
memory/3040-8-0x0000000000400000-0x000000000046E000-memory.dmp
memory/2848-12-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2848-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2612-14-0x0000000000520000-0x0000000000620000-memory.dmp
memory/2848-20-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2848-19-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2848-18-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2612-16-0x0000000000400000-0x000000000046E000-memory.dmp
memory/2848-9-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2848-21-0x00000000000D0000-0x00000000000E5000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:36
Reported
2024-01-07 19:39
Platform
win10v2004-20231215-en
Max time kernel
1s
Max time network
123s
Command Line
Signatures
Tofsee
Creates new service(s)
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Enumerates physical storage devices
Processes
C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe
"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vrsrbemn\
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jwnwobdx.exe" C:\Windows\SysWOW64\vrsrbemn\
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" create vrsrbemn binPath= "C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe /d\"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe\"" type= own start= auto DisplayName= "wifi support"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" description vrsrbemn "wifi internet conection"
C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe
C:\Windows\SysWOW64\vrsrbemn\jwnwobdx.exe /d"C:\Users\Admin\AppData\Local\Temp\a4ca303e0a9292f78b545bf698aa8c33.exe"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" start vrsrbemn
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
C:\Windows\SysWOW64\svchost.exe
svchost.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| GB | 87.248.205.0:80 | tcp | |
| RU | 94.100.180.31:25 | tcp | |
| GB | 96.17.179.50:80 | tcp | |
| GB | 96.17.179.50:80 | tcp | |
| GB | 96.17.179.50:80 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| GB | 96.17.179.50:80 | tcp | |
| GB | 96.17.179.50:80 | tcp | |
| GB | 96.17.179.50:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp |
Files
memory/3900-2-0x0000000000610000-0x0000000000623000-memory.dmp
memory/3900-4-0x0000000000400000-0x000000000046E000-memory.dmp
memory/3900-1-0x0000000000640000-0x0000000000740000-memory.dmp
memory/1280-8-0x0000000000740000-0x0000000000840000-memory.dmp
memory/4340-9-0x0000000000BE0000-0x0000000000BF5000-memory.dmp
memory/1280-10-0x0000000000400000-0x000000000046E000-memory.dmp
memory/4340-13-0x0000000000BE0000-0x0000000000BF5000-memory.dmp
memory/3900-14-0x0000000000400000-0x000000000046E000-memory.dmp
memory/4340-15-0x0000000000BE0000-0x0000000000BF5000-memory.dmp
memory/4340-16-0x0000000000BE0000-0x0000000000BF5000-memory.dmp
memory/3900-22-0x0000000000640000-0x0000000000740000-memory.dmp
memory/3900-23-0x0000000000610000-0x0000000000623000-memory.dmp
memory/4340-26-0x0000000000BE0000-0x0000000000BF5000-memory.dmp