Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 19:59

General

  • Target

    acb8cd26d804916a7e98d7f0fd8157e4.exe

  • Size

    13.6MB

  • MD5

    acb8cd26d804916a7e98d7f0fd8157e4

  • SHA1

    23b660393932160ee5d5450dc743cf75c73d7b80

  • SHA256

    d39c5063a4eda5f8ea4649825487354b2f0592809999413090b707f633204da6

  • SHA512

    3ef7d0e17b9aafeebf36d49a2f90218ae3a7c1c14b17d73f30d771f6d57107569b34617cb965ea8617441952d72c912660d63303be9e1ff153535b4115013e9b

  • SSDEEP

    24576:tlxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBJ:tlzOR

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acb8cd26d804916a7e98d7f0fd8157e4.exe
    "C:\Users\Admin\AppData\Local\Temp\acb8cd26d804916a7e98d7f0fd8157e4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\unfblpbj\
      2⤵
        PID:3036
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ddavypgy.exe" C:\Windows\SysWOW64\unfblpbj\
        2⤵
          PID:2464
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create unfblpbj binPath= "C:\Windows\SysWOW64\unfblpbj\ddavypgy.exe /d\"C:\Users\Admin\AppData\Local\Temp\acb8cd26d804916a7e98d7f0fd8157e4.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2616
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description unfblpbj "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2728
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start unfblpbj
          2⤵
          • Launches sc.exe
          PID:2656
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2408
      • C:\Windows\SysWOW64\unfblpbj\ddavypgy.exe
        C:\Windows\SysWOW64\unfblpbj\ddavypgy.exe /d"C:\Users\Admin\AppData\Local\Temp\acb8cd26d804916a7e98d7f0fd8157e4.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2384

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\ddavypgy.exe

              Filesize

              196KB

              MD5

              0b0175225a50950e74fc3ed5dd949037

              SHA1

              12865485d195442a7f8b641e455bf4c443726333

              SHA256

              1858bfa2bef61dee502830950b282432817d4d736d5d8ac264a93b8533cc9612

              SHA512

              15f0a040d02cad553c75243a57db3ec26b964a7d0670028f009f1e71ccda6d5c5f5666ec7e604b8543076794a7268e6ce6cd21e99802ef047457731a03e48b02

            • C:\Windows\SysWOW64\unfblpbj\ddavypgy.exe

              Filesize

              9.7MB

              MD5

              e80d0eba5a9f9edc2374206c86a201f3

              SHA1

              50cdd41070c91b2750d71324abcce2b9f59c47b5

              SHA256

              9aa06854f36b6170f68e6d095a4713d1116ebce7fcf526b7bf2ee1952afbba8f

              SHA512

              fa9be4aec1f3cff87aa4f62831f0b2e16ae42dddeccc18d3dc821eb3b6020819c86802ba33349504401f1f55457bbc35cc03b6469d5a77ee69c40b8449b2e23b

            • memory/1708-1-0x0000000000510000-0x0000000000610000-memory.dmp

              Filesize

              1024KB

            • memory/1708-3-0x0000000000220000-0x0000000000233000-memory.dmp

              Filesize

              76KB

            • memory/1708-4-0x0000000000400000-0x0000000000468000-memory.dmp

              Filesize

              416KB

            • memory/1708-8-0x0000000000400000-0x0000000000468000-memory.dmp

              Filesize

              416KB

            • memory/2384-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2384-11-0x00000000000C0000-0x00000000000D5000-memory.dmp

              Filesize

              84KB

            • memory/2384-14-0x00000000000C0000-0x00000000000D5000-memory.dmp

              Filesize

              84KB

            • memory/2384-19-0x00000000000C0000-0x00000000000D5000-memory.dmp

              Filesize

              84KB

            • memory/2384-20-0x00000000000C0000-0x00000000000D5000-memory.dmp

              Filesize

              84KB

            • memory/2384-21-0x00000000000C0000-0x00000000000D5000-memory.dmp

              Filesize

              84KB

            • memory/2492-10-0x0000000000400000-0x0000000000468000-memory.dmp

              Filesize

              416KB

            • memory/2492-9-0x00000000002D0000-0x00000000003D0000-memory.dmp

              Filesize

              1024KB

            • memory/2492-17-0x0000000000400000-0x0000000000468000-memory.dmp

              Filesize

              416KB