Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 22:24

General

  • Target

    a2dac4450c8268e2c3ab41b28da9f6de.exe

  • Size

    13.3MB

  • MD5

    a2dac4450c8268e2c3ab41b28da9f6de

  • SHA1

    4c112829564be4fd7208b5388b641a8ab68eefb7

  • SHA256

    a6f0edcc4248c96cf33015626c80868eb1c9ed47198317c7add48ce23638c83f

  • SHA512

    bc58ad5a68d7f3238bc59d775b28fc195859f3b42f20cf12dc8748d7f2e4e5d25d7080cc260990262f5d5760ecf51be5d9330c5a4bea7e886c33959bb6c33f82

  • SSDEEP

    196608:5V8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY/:

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe
    "C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pfhgrfhe\
      2⤵
        PID:4536
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rsuvpsnf.exe" C:\Windows\SysWOW64\pfhgrfhe\
        2⤵
          PID:5040
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create pfhgrfhe binPath= "C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe /d\"C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2356
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description pfhgrfhe "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:3536
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start pfhgrfhe
          2⤵
          • Launches sc.exe
          PID:228
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3260
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1304
          2⤵
          • Program crash
          PID:1644
      • C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe
        C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe /d"C:\Users\Admin\AppData\Local\Temp\a2dac4450c8268e2c3ab41b28da9f6de.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5104
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 512
          2⤵
          • Program crash
          PID:1140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1492 -ip 1492
        1⤵
          PID:3368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5104 -ip 5104
          1⤵
            PID:1716

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rsuvpsnf.exe

            Filesize

            13.4MB

            MD5

            67e7af8924e445327fd48714afad42a4

            SHA1

            4ba14d229cbbf3e4bcd1ac89620c51fdbe4d8ece

            SHA256

            6c73c57dd9cd6a2fe374f2f7e8699c660f3b9d5917361f205a556a3d4f50415f

            SHA512

            b923d7c9389d514ac47f6594677722aac5ca43126c10985db811d9d57ead0402308f47d39876e2d3d9ee1271deb42e129b7a6669a22b7dae6a61bee7d4d8832d

          • C:\Windows\SysWOW64\pfhgrfhe\rsuvpsnf.exe

            Filesize

            12.5MB

            MD5

            ad1ed314869dd490b15081075c6f3f82

            SHA1

            60f67f59028f4a166cb206f9bc77e2bc00386dba

            SHA256

            84d893222a7dfc8b88c610d712c1e769df26ec8cdf6fe9c1d8afb868fe9ab9ea

            SHA512

            070b8cae2e9b36947dbcfe95c4594282f1ed6c5261f5fb35f069e3393d28fee5b598d3887917a9d217ba0f925b55bd600e5815b47746a95cf8661e1b83aa48d5

          • memory/1492-8-0x0000000000A80000-0x0000000000A93000-memory.dmp

            Filesize

            76KB

          • memory/1492-4-0x0000000000400000-0x00000000008EA000-memory.dmp

            Filesize

            4.9MB

          • memory/1492-2-0x0000000000A80000-0x0000000000A93000-memory.dmp

            Filesize

            76KB

          • memory/1492-7-0x0000000000400000-0x00000000008EA000-memory.dmp

            Filesize

            4.9MB

          • memory/1492-1-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

            Filesize

            1024KB

          • memory/4840-11-0x0000000000D30000-0x0000000000D45000-memory.dmp

            Filesize

            84KB

          • memory/4840-15-0x0000000000D30000-0x0000000000D45000-memory.dmp

            Filesize

            84KB

          • memory/4840-16-0x0000000000D30000-0x0000000000D45000-memory.dmp

            Filesize

            84KB

          • memory/4840-18-0x0000000000D30000-0x0000000000D45000-memory.dmp

            Filesize

            84KB

          • memory/4840-19-0x0000000000D30000-0x0000000000D45000-memory.dmp

            Filesize

            84KB

          • memory/5104-10-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

            Filesize

            1024KB

          • memory/5104-12-0x0000000000400000-0x00000000008EA000-memory.dmp

            Filesize

            4.9MB

          • memory/5104-17-0x0000000000400000-0x00000000008EA000-memory.dmp

            Filesize

            4.9MB