Malware Analysis Report

2025-08-05 17:03

Sample ID 240107-ycff3sdfc7
Target 496bbe032a73902d776751dacc128876.exe
SHA256 2beb801d312dc631c95a1b7dcd4b698d5be0c618097941c42ff70536e3fae87c
Tags
tofsee evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2beb801d312dc631c95a1b7dcd4b698d5be0c618097941c42ff70536e3fae87c

Threat Level: Known bad

The file 496bbe032a73902d776751dacc128876.exe was found to be: Known bad.

Malicious Activity Summary

tofsee evasion persistence trojan

Tofsee

Creates new service(s)

Modifies Windows Firewall

Launches sc.exe

Unsigned PE

Enumerates physical storage devices

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-07 19:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-07 19:38

Reported

2024-01-07 19:41

Platform

win7-20231215-en

Max time kernel

0s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

Signatures

Tofsee

trojan tofsee

Creates new service(s)

persistence

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe

"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lkoomoma\

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hkidxeoy.exe" C:\Windows\SysWOW64\lkoomoma\

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" create lkoomoma binPath= "C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe /d\"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe\"" type= own start= auto DisplayName= "wifi support"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" description lkoomoma "wifi internet conection"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" start lkoomoma

C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe

C:\Windows\SysWOW64\lkoomoma\hkidxeoy.exe /d"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

C:\Windows\SysWOW64\netsh.exe

"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 microsoft.com udp
US 20.112.250.133:80 microsoft.com tcp
US 8.8.8.8:53 microsoft.com udp
US 8.8.8.8:53 microsoft-com.mail.protection.outlook.com udp
US 52.101.42.0:25 microsoft-com.mail.protection.outlook.com tcp
US 8.8.8.8:53 defeatwax.ru udp
US 8.8.8.8:53 yahoo.com udp
US 8.8.8.8:53 mta6.am0.yahoodns.net udp
US 98.136.96.74:25 mta6.am0.yahoodns.net tcp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 smtp.google.com udp
US 108.177.127.27:25 smtp.google.com tcp
US 8.8.8.8:53 mail.ru udp
US 8.8.8.8:53 mxs.mail.ru udp
RU 217.69.139.150:25 mxs.mail.ru tcp
US 8.8.8.8:53 refabyd.info udp

Files

memory/1716-3-0x00000000001B0000-0x00000000001C3000-memory.dmp

memory/1716-4-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/1716-1-0x00000000002B0000-0x00000000003B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\hkidxeoy.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2836-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2256-13-0x0000000001E60000-0x0000000001F60000-memory.dmp

memory/2836-16-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/1716-17-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/2256-14-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/2836-11-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2836-8-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2836-18-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2836-19-0x00000000000D0000-0x00000000000E5000-memory.dmp

memory/2256-20-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/2836-21-0x00000000000D0000-0x00000000000E5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-07 19:38

Reported

2024-01-07 19:41

Platform

win10v2004-20231222-en

Max time kernel

3s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

Signatures

Tofsee

trojan tofsee

Creates new service(s)

persistence

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe

"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bisnbhzu\

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pbnvvgvd.exe" C:\Windows\SysWOW64\bisnbhzu\

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" create bisnbhzu binPath= "C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe /d\"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe\"" type= own start= auto DisplayName= "wifi support"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" description bisnbhzu "wifi internet conection"

C:\Windows\SysWOW64\sc.exe

"C:\Windows\System32\sc.exe" start bisnbhzu

C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe

C:\Windows\SysWOW64\bisnbhzu\pbnvvgvd.exe /d"C:\Users\Admin\AppData\Local\Temp\496bbe032a73902d776751dacc128876.exe"

C:\Windows\SysWOW64\netsh.exe

"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 83.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 microsoft.com udp
US 20.112.250.133:80 microsoft.com tcp
US 8.8.8.8:53 microsoft.com udp
US 8.8.8.8:53 microsoft-com.mail.protection.outlook.com udp
US 52.101.8.49:25 microsoft-com.mail.protection.outlook.com tcp
US 8.8.8.8:53 udp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 refabyd.info udp
US 8.8.8.8:53 mail.ru udp
US 8.8.8.8:53 mxs.mail.ru udp
RU 94.100.180.31:25 mxs.mail.ru tcp
US 8.8.8.8:53 refabyd.info udp
PH 23.37.1.183:80 tcp
PH 23.37.1.183:80 tcp
US 8.8.8.8:53 refabyd.info udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 refabyd.info udp
GB 96.17.179.83:80 tcp
GB 96.17.179.83:80 tcp
GB 96.17.179.83:80 tcp

Files

memory/2824-2-0x0000000001D90000-0x0000000001DA3000-memory.dmp

memory/2824-1-0x0000000001DB0000-0x0000000001EB0000-memory.dmp

memory/2824-4-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/2824-8-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/2824-9-0x0000000001D90000-0x0000000001DA3000-memory.dmp

memory/1468-10-0x0000000001FD0000-0x00000000020D0000-memory.dmp

memory/4784-11-0x0000000000AE0000-0x0000000000AF5000-memory.dmp

memory/4784-16-0x0000000000AE0000-0x0000000000AF5000-memory.dmp

memory/1468-15-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/4784-17-0x0000000000AE0000-0x0000000000AF5000-memory.dmp

memory/1468-13-0x0000000000400000-0x0000000001D75000-memory.dmp

memory/4784-18-0x0000000000AE0000-0x0000000000AF5000-memory.dmp