Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:39

General

  • Target

    751d870aa39047bca3a7e6cca0e11303.exe

  • Size

    11.4MB

  • MD5

    751d870aa39047bca3a7e6cca0e11303

  • SHA1

    6220cacde3e1f98a5a1813ae7324ba951bcbe895

  • SHA256

    47ce762a85469542401e2cdede7e409f236cca6d8c2f77337bdc31a31ad9f6c8

  • SHA512

    5e553ba1c774731d30a79f406a9f21a6a7af393ac7a7cdc0598e4e672ebb4b9b88f716a9ecef86252aaa615df256ba37f874bf7f2eb6c2413be9b45a8e54a487

  • SSDEEP

    12288:hTAazcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcHzcn:9

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe
    "C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gosdhqcx\
      2⤵
        PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dkwjsfga.exe" C:\Windows\SysWOW64\gosdhqcx\
        2⤵
          PID:1004
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gosdhqcx binPath= "C:\Windows\SysWOW64\gosdhqcx\dkwjsfga.exe /d\"C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:4856
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description gosdhqcx "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1976
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start gosdhqcx
          2⤵
          • Launches sc.exe
          PID:4332
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3860
      • C:\Windows\SysWOW64\gosdhqcx\dkwjsfga.exe
        C:\Windows\SysWOW64\gosdhqcx\dkwjsfga.exe /d"C:\Users\Admin\AppData\Local\Temp\751d870aa39047bca3a7e6cca0e11303.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          PID:804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 512
          2⤵
          • Program crash
          PID:464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2700 -ip 2700
        1⤵
          PID:1040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dkwjsfga.exe

          Filesize

          14.4MB

          MD5

          55e3c778b3dc5a4c68be2c7cca3ff0ba

          SHA1

          e28af63482d1c2c4651cfe6eb3e8a2275bf751d4

          SHA256

          b6e7b7fe2e2d32adee83978b7cd5f72a72699254f4c57ea3fc51b43280c5cd6a

          SHA512

          ee95a9287e9509ec6814364d9829caa68165fa1569be5c064e350ff264085123ae98bb0bd59679afac87f7815478a25c4050b892b9ef8bc4f21c154357c0d994

        • C:\Windows\SysWOW64\gosdhqcx\dkwjsfga.exe

          Filesize

          2.1MB

          MD5

          c5f2395da74ab65b223248d0a22816fb

          SHA1

          1901b0a66d07dca6bcb6df9fa68309d6ca08c49a

          SHA256

          95f0a51b623a3db0b4a6c7fdd194c71565e9854dd20c33648a755dfdc1a6ca68

          SHA512

          763d0554237ad0ca4dc994503b1734c192f97dbd93b5faf989ad61c54293642171ab32ce5b38194ca97aba43e7b4434d0c4e4d9893d2b0b6a07b69b92cce31b2

        • memory/804-13-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

          Filesize

          84KB

        • memory/804-17-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

          Filesize

          84KB

        • memory/804-22-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

          Filesize

          84KB

        • memory/804-9-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

          Filesize

          84KB

        • memory/804-18-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

          Filesize

          84KB

        • memory/2368-2-0x0000000001F20000-0x0000000001F33000-memory.dmp

          Filesize

          76KB

        • memory/2368-4-0x0000000000400000-0x0000000001D73000-memory.dmp

          Filesize

          25.4MB

        • memory/2368-1-0x0000000001F50000-0x0000000002050000-memory.dmp

          Filesize

          1024KB

        • memory/2368-19-0x0000000001F50000-0x0000000002050000-memory.dmp

          Filesize

          1024KB

        • memory/2368-16-0x0000000000400000-0x0000000001D73000-memory.dmp

          Filesize

          25.4MB

        • memory/2700-11-0x0000000000400000-0x0000000001D73000-memory.dmp

          Filesize

          25.4MB

        • memory/2700-15-0x0000000002650000-0x0000000002663000-memory.dmp

          Filesize

          76KB

        • memory/2700-14-0x0000000000400000-0x0000000001D73000-memory.dmp

          Filesize

          25.4MB

        • memory/2700-8-0x0000000001EB0000-0x0000000001FB0000-memory.dmp

          Filesize

          1024KB