Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2024 00:20

General

  • Target

    75e5182964f42c0b0761107ea401338d.exe

  • Size

    10.5MB

  • MD5

    75e5182964f42c0b0761107ea401338d

  • SHA1

    1095924492b72640c229e9712b69fdbb94681d8e

  • SHA256

    4cac9e3b3d8e0446cbbe43456e8b44bf8b4cd0ac99f9c00552904c623fb03e3c

  • SHA512

    3230af9491cfee8a4358ba465f928d18b3c9c869af36501eaf228b6f6d15c0cd380609254ce12e4ef2585fd2828e31b4e626fea11b33b23bf45a66f2a3fc6b0a

  • SSDEEP

    98304:ivjOF//////////////////////////////////////////////////////////H:0

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75e5182964f42c0b0761107ea401338d.exe
    "C:\Users\Admin\AppData\Local\Temp\75e5182964f42c0b0761107ea401338d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oilpcyfn\
      2⤵
        PID:780
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dmgldcxt.exe" C:\Windows\SysWOW64\oilpcyfn\
        2⤵
          PID:864
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create oilpcyfn binPath= "C:\Windows\SysWOW64\oilpcyfn\dmgldcxt.exe /d\"C:\Users\Admin\AppData\Local\Temp\75e5182964f42c0b0761107ea401338d.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1496
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description oilpcyfn "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:1828
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start oilpcyfn
          2⤵
          • Launches sc.exe
          PID:1052
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 660
          2⤵
          • Program crash
          PID:3716
      • C:\Windows\SysWOW64\oilpcyfn\dmgldcxt.exe
        C:\Windows\SysWOW64\oilpcyfn\dmgldcxt.exe /d"C:\Users\Admin\AppData\Local\Temp\75e5182964f42c0b0761107ea401338d.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:3976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 512
          2⤵
          • Program crash
          PID:3532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1196 -ip 1196
        1⤵
          PID:5088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2636 -ip 2636
          1⤵
            PID:4760

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\dmgldcxt.exe

            Filesize

            14.0MB

            MD5

            cd37560b13db65f227611fe491116a8d

            SHA1

            c258859a62a94f43391d15d42afc65858ec03985

            SHA256

            bef43b28fa118a46957380bfd7289a14dd04a0b603ab26236ce6feefe8312e51

            SHA512

            0fb0f023acf149fde51f9515414b4e8ab630a3f7a2ee21333ddca0f951a2ec77111c64b04c257595cbf0c74fce3fdfa44ec44641fea9a2016e363edafc0da439

          • memory/1196-1-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

            Filesize

            1024KB

          • memory/1196-2-0x0000000002960000-0x0000000002973000-memory.dmp

            Filesize

            76KB

          • memory/1196-4-0x0000000000400000-0x0000000000C1F000-memory.dmp

            Filesize

            8.1MB

          • memory/1196-8-0x0000000000400000-0x0000000000C1F000-memory.dmp

            Filesize

            8.1MB

          • memory/1196-9-0x0000000002960000-0x0000000002973000-memory.dmp

            Filesize

            76KB

          • memory/2636-11-0x0000000000E50000-0x0000000000F50000-memory.dmp

            Filesize

            1024KB

          • memory/2636-16-0x0000000000400000-0x0000000000C1F000-memory.dmp

            Filesize

            8.1MB

          • memory/2636-17-0x0000000000400000-0x0000000000C1F000-memory.dmp

            Filesize

            8.1MB

          • memory/3976-12-0x00000000001C0000-0x00000000001D5000-memory.dmp

            Filesize

            84KB

          • memory/3976-15-0x00000000001C0000-0x00000000001D5000-memory.dmp

            Filesize

            84KB

          • memory/3976-18-0x00000000001C0000-0x00000000001D5000-memory.dmp

            Filesize

            84KB

          • memory/3976-19-0x00000000001C0000-0x00000000001D5000-memory.dmp

            Filesize

            84KB