Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 15:37

General

  • Target

    bb9f7ff7ede3ef9d02513c000e39b108.exe

  • Size

    14.7MB

  • MD5

    bb9f7ff7ede3ef9d02513c000e39b108

  • SHA1

    00f3907716b3fd5fb2eb9bfa99d00119e1e1c660

  • SHA256

    89fe92a8a1608b4288b77b39d34ae6e79aa1244040b5d2a5c5857edebabe6401

  • SHA512

    88b9ac25ea80f497f9410f7afb1b420733a2ebd849d7d69c4954fec873ad125318bf607a40f090ca5ad54def601cd49c888fe96f644d67dbb6a3dc1a6f7f671d

  • SSDEEP

    6144:v0+ogoEtmYSAekxvC0J6xPFNAgbx/ektPses9zWTPGtYtYtYtYtYtYtYtYtYtYtz:hogo0Pekxvs1F2S/TtmpWr

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb9f7ff7ede3ef9d02513c000e39b108.exe
    "C:\Users\Admin\AppData\Local\Temp\bb9f7ff7ede3ef9d02513c000e39b108.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gqqfmqfx\
      2⤵
        PID:692
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vizianpj.exe" C:\Windows\SysWOW64\gqqfmqfx\
        2⤵
          PID:4776
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gqqfmqfx binPath= "C:\Windows\SysWOW64\gqqfmqfx\vizianpj.exe /d\"C:\Users\Admin\AppData\Local\Temp\bb9f7ff7ede3ef9d02513c000e39b108.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:3984
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description gqqfmqfx "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2324
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start gqqfmqfx
          2⤵
          • Launches sc.exe
          PID:1900
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:1972
      • C:\Windows\SysWOW64\gqqfmqfx\vizianpj.exe
        C:\Windows\SysWOW64\gqqfmqfx\vizianpj.exe /d"C:\Users\Admin\AppData\Local\Temp\bb9f7ff7ede3ef9d02513c000e39b108.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:4388

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\vizianpj.exe

        Filesize

        2.2MB

        MD5

        54afdd53bde3940b10b6e5b2ddbb3b36

        SHA1

        728ef49582930a9f16396f0280777b2dac4ff982

        SHA256

        9671c5bda86b83bda8e0902643fd468be028d886fdc50e87f4fc60da54ec7716

        SHA512

        ca9ea50232f8d927f82f1542361e392f62d1a507787851ac92fa6de89bbb57bd26a104809dbe560f11663c20ee6ff74445ea976384703667d7b38071f55ac1b0

      • C:\Windows\SysWOW64\gqqfmqfx\vizianpj.exe

        Filesize

        2.4MB

        MD5

        158deba8695d98cb93658ee79571c9cd

        SHA1

        d5394c7147cac7bd6636cd2d187c5550daf60f62

        SHA256

        87cce3170b867083f19b897bc9739e9051761b021c6ac552ad5e077a3ea0020d

        SHA512

        8069e3ba486c4bb9347ff2d6717272d339a0abfe5efc033f04c9586b73b0f67a2c76dfb163db648feba2cbc174c219508edcfc8b549c2cadb4cc8c08010a12a1

      • memory/3140-10-0x00000000034E0000-0x00000000035E0000-memory.dmp

        Filesize

        1024KB

      • memory/3140-15-0x0000000000400000-0x000000000324F000-memory.dmp

        Filesize

        46.3MB

      • memory/3140-16-0x0000000000400000-0x000000000324F000-memory.dmp

        Filesize

        46.3MB

      • memory/3656-9-0x00000000034B0000-0x00000000034C3000-memory.dmp

        Filesize

        76KB

      • memory/3656-1-0x0000000003570000-0x0000000003670000-memory.dmp

        Filesize

        1024KB

      • memory/3656-8-0x0000000000400000-0x000000000324F000-memory.dmp

        Filesize

        46.3MB

      • memory/3656-4-0x0000000000400000-0x000000000324F000-memory.dmp

        Filesize

        46.3MB

      • memory/3656-2-0x00000000034B0000-0x00000000034C3000-memory.dmp

        Filesize

        76KB

      • memory/4388-11-0x00000000001B0000-0x00000000001C5000-memory.dmp

        Filesize

        84KB

      • memory/4388-14-0x00000000001B0000-0x00000000001C5000-memory.dmp

        Filesize

        84KB

      • memory/4388-17-0x00000000001B0000-0x00000000001C5000-memory.dmp

        Filesize

        84KB

      • memory/4388-18-0x00000000001B0000-0x00000000001C5000-memory.dmp

        Filesize

        84KB

      • memory/4388-19-0x00000000001B0000-0x00000000001C5000-memory.dmp

        Filesize

        84KB