Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 12:28

General

  • Target

    74b207c88cf49d87489234697e01459a.exe

  • Size

    14.8MB

  • MD5

    74b207c88cf49d87489234697e01459a

  • SHA1

    4b6aee7a8491f8af19baedab30e80198b4f4c395

  • SHA256

    819e8ea3bf2c3bd94269febabb6aa64c54cf542306ae38c35ad79862a3b25fcd

  • SHA512

    8b552b8e5724ebba31168c16759aea7035efc60b13eb203030aae6fc0adad1520ccf0da6371eabc2b61d96f646117c6699add6f6b1ea3247bf8e577443fbf554

  • SSDEEP

    24576:ngdy5yNM4444444444444444444444444444444444444444444444444444444H:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe
    "C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yjvduzf\
      2⤵
        PID:948
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pkzjotlj.exe" C:\Windows\SysWOW64\yjvduzf\
        2⤵
          PID:2004
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create yjvduzf binPath= "C:\Windows\SysWOW64\yjvduzf\pkzjotlj.exe /d\"C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:3660
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description yjvduzf "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:3736
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start yjvduzf
          2⤵
          • Launches sc.exe
          PID:4048
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:5044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 1220
          2⤵
          • Program crash
          PID:2996
      • C:\Windows\SysWOW64\yjvduzf\pkzjotlj.exe
        C:\Windows\SysWOW64\yjvduzf\pkzjotlj.exe /d"C:\Users\Admin\AppData\Local\Temp\74b207c88cf49d87489234697e01459a.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:4200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 532
          2⤵
          • Program crash
          PID:224
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1712 -ip 1712
        1⤵
          PID:3892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2556 -ip 2556
          1⤵
            PID:3844

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\pkzjotlj.exe

            Filesize

            13.1MB

            MD5

            fe593716212ef1f811ff4a1c2298989f

            SHA1

            24484bd48e2e4789307c91eb609e21c657f6cc4b

            SHA256

            5420b7eb72c939a11f06e0a488df8cfe19fe87bebc0b9e3016ef25f846476439

            SHA512

            7412a76fd3ed5d1e0c20fd937a2efbe03517f19c75eae877f742b47c1574dd19e97fd6412ef5579d2dfcbd12d6a026a15743600d53fd2cfb0029ed7182fb5cb5

          • memory/1712-1-0x00000000004B0000-0x00000000005B0000-memory.dmp

            Filesize

            1024KB

          • memory/1712-2-0x0000000002080000-0x0000000002093000-memory.dmp

            Filesize

            76KB

          • memory/1712-4-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1712-8-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/1712-9-0x0000000002080000-0x0000000002093000-memory.dmp

            Filesize

            76KB

          • memory/2556-10-0x0000000000540000-0x0000000000640000-memory.dmp

            Filesize

            1024KB

          • memory/2556-11-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/2556-17-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/4200-12-0x0000000000530000-0x0000000000545000-memory.dmp

            Filesize

            84KB

          • memory/4200-15-0x0000000000530000-0x0000000000545000-memory.dmp

            Filesize

            84KB

          • memory/4200-16-0x0000000000530000-0x0000000000545000-memory.dmp

            Filesize

            84KB

          • memory/4200-18-0x0000000000530000-0x0000000000545000-memory.dmp

            Filesize

            84KB

          • memory/4200-19-0x0000000000530000-0x0000000000545000-memory.dmp

            Filesize

            84KB