Analysis Overview
SHA256
2beb801d312dc631c95a1b7dcd4b698d5be0c618097941c42ff70536e3fae87c
Threat Level: Known bad
The file 496bbe032a73902d776751dacc128876.exe was found to be: Known bad.
Malicious Activity Summary
Tofsee
Creates new service(s)
Modifies Windows Firewall
Launches sc.exe
Unsigned PE
Enumerates physical storage devices
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:38
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:38
Reported
2024-01-07 19:41
Platform
win7-20231215-en
Max time kernel
0s
Max time network
145s
Command Line
Signatures
Tofsee
Creates new service(s)
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Enumerates physical storage devices
Processes
C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe
"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lkoomoma\
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hkidxeoy.exe" C:\Windows\SysWOW64\lkoomoma\
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" create lkoomoma binPath= "C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe /d\"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe\"" type= own start= auto DisplayName= "wifi support"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" description lkoomoma "wifi internet conection"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" start lkoomoma
C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe
C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe /d"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
C:\Windows\SysWOW64\svchost.exe
svchost.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 20.112.250.133:80 | microsoft.com | tcp |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 8.8.8.8:53 | microsoft-com.mail.protection.outlook.com | udp |
| US | 52.101.42.0:25 | microsoft-com.mail.protection.outlook.com | tcp |
| US | 8.8.8.8:53 | defeatwax.ru | udp |
| US | 8.8.8.8:53 | yahoo.com | udp |
| US | 8.8.8.8:53 | mta6.am0.yahoodns.net | udp |
| US | 98.136.96.74:25 | mta6.am0.yahoodns.net | tcp |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | smtp.google.com | udp |
| US | 108.177.127.27:25 | smtp.google.com | tcp |
| US | 8.8.8.8:53 | mail.ru | udp |
| US | 8.8.8.8:53 | mxs.mail.ru | udp |
| RU | 217.69.139.150:25 | mxs.mail.ru | tcp |
| US | 8.8.8.8:53 | refabyd.info | udp |
Files
memory/1716-3-0x00000000001B0000-0x00000000001C3000-memory.dmp
memory/1716-4-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/1716-1-0x00000000002B0000-0x00000000003B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\hkidxeoy.exe
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/2836-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2256-13-0x0000000001E60000-0x0000000001F60000-memory.dmp
memory/2836-16-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/1716-17-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/2256-14-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/2836-11-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2836-8-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2836-18-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2836-19-0x00000000000D0000-0x00000000000E5000-memory.dmp
memory/2256-20-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/2836-21-0x00000000000D0000-0x00000000000E5000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:38
Reported
2024-01-07 19:41
Platform
win10v2004-20231222-en
Max time kernel
3s
Max time network
131s
Command Line
Signatures
Tofsee
Creates new service(s)
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\netsh.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Enumerates physical storage devices
Processes
C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe
"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bisnbhzu\
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pbnvvgvd.exe" C:\Windows\SysWOW64\bisnbhzu\
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" create bisnbhzu binPath= "C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe /d\"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe\"" type= own start= auto DisplayName= "wifi support"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" description bisnbhzu "wifi internet conection"
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" start bisnbhzu
C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe
C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe /d"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
C:\Windows\SysWOW64\svchost.exe
svchost.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 20.112.250.133:80 | microsoft.com | tcp |
| US | 8.8.8.8:53 | microsoft.com | udp |
| US | 8.8.8.8:53 | microsoft-com.mail.protection.outlook.com | udp |
| US | 52.101.8.49:25 | microsoft-com.mail.protection.outlook.com | tcp |
| US | 8.8.8.8:53 | udp | |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | refabyd.info | udp |
| US | 8.8.8.8:53 | mail.ru | udp |
| US | 8.8.8.8:53 | mxs.mail.ru | udp |
| RU | 94.100.180.31:25 | mxs.mail.ru | tcp |
| US | 8.8.8.8:53 | refabyd.info | udp |
| PH | 23.37.1.183:80 | tcp | |
| PH | 23.37.1.183:80 | tcp | |
| US | 8.8.8.8:53 | refabyd.info | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | refabyd.info | udp |
| GB | 96.17.179.83:80 | tcp | |
| GB | 96.17.179.83:80 | tcp | |
| GB | 96.17.179.83:80 | tcp |
Files
memory/2824-2-0x0000000001D90000-0x0000000001DA3000-memory.dmp
memory/2824-1-0x0000000001DB0000-0x0000000001EB0000-memory.dmp
memory/2824-4-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/2824-8-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/2824-9-0x0000000001D90000-0x0000000001DA3000-memory.dmp
memory/1468-10-0x0000000001FD0000-0x00000000020D0000-memory.dmp
memory/4784-11-0x0000000000AE0000-0x0000000000AF5000-memory.dmp
memory/4784-16-0x0000000000AE0000-0x0000000000AF5000-memory.dmp
memory/1468-15-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/4784-17-0x0000000000AE0000-0x0000000000AF5000-memory.dmp
memory/1468-13-0x0000000000400000-0x0000000001D75000-memory.dmp
memory/4784-18-0x0000000000AE0000-0x0000000000AF5000-memory.dmp