Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 20:46

General

  • Target

    c99590ceea962a47d2c1f296427fd4c0.exe

  • Size

    12.5MB

  • MD5

    c99590ceea962a47d2c1f296427fd4c0

  • SHA1

    50a6bdfa2ffd566ccd88ef3dfb7b2e6a4a087afa

  • SHA256

    4e22f19f44e653a725ee0efb10b66985cd6b56df527781659b14fdad2645e542

  • SHA512

    d2635a75533708305f47456df0eca41cbe669a9b722c656673bae02c696e8b23e7704a96ef57a0106daa9eb28da902758c84ad1c477068363f190e1ae6d431d0

  • SSDEEP

    24576:6erU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbX:6sW

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c99590ceea962a47d2c1f296427fd4c0.exe
    "C:\Users\Admin\AppData\Local\Temp\c99590ceea962a47d2c1f296427fd4c0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\urwcbemt\
      2⤵
        PID:4760
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dmcqrfua.exe" C:\Windows\SysWOW64\urwcbemt\
        2⤵
          PID:4052
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create urwcbemt binPath= "C:\Windows\SysWOW64\urwcbemt\dmcqrfua.exe /d\"C:\Users\Admin\AppData\Local\Temp\c99590ceea962a47d2c1f296427fd4c0.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1228
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description urwcbemt "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:684
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start urwcbemt
          2⤵
          • Launches sc.exe
          PID:4364
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3664
      • C:\Windows\SysWOW64\urwcbemt\dmcqrfua.exe
        C:\Windows\SysWOW64\urwcbemt\dmcqrfua.exe /d"C:\Users\Admin\AppData\Local\Temp\c99590ceea962a47d2c1f296427fd4c0.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          PID:784

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\dmcqrfua.exe

              Filesize

              14.5MB

              MD5

              7effdf76504c8ccf96b175c590dd6560

              SHA1

              afd2eb2ba0fb0b1ffae1646b63cdd7260348abd5

              SHA256

              31b205bef570d6c52a14560c1ea506a4b72219c3d9ee3694d1b868da6649578c

              SHA512

              6cc2130f7659d11690358869c3f7a38596c179e8deeabec0e521edf93edd6a30a3c0b08b2e35a0a2c910b6dc62fd66d37033cf0b222372dc2f7481b4d5da3a23

            • C:\Windows\SysWOW64\urwcbemt\dmcqrfua.exe

              Filesize

              4.8MB

              MD5

              360e66a39e748903aa03672934d56476

              SHA1

              c091a70ccb9f03bdf12f69feeab6783a69d70f83

              SHA256

              28d06d4b807cc4e6df594c8c08df7196f9160ebf9505aceb6f55a2273aaea5aa

              SHA512

              236783c42f2c0ee895cd0a75d7cf98f808bf79bc5704a5788ac53942ca71412ee972400f12898b3aea2b13392ce8b0b1c8066ba5935014fa1dd54966b7e46e73

            • memory/784-12-0x0000000000950000-0x0000000000965000-memory.dmp

              Filesize

              84KB

            • memory/784-27-0x0000000000950000-0x0000000000965000-memory.dmp

              Filesize

              84KB

            • memory/784-20-0x0000000000950000-0x0000000000965000-memory.dmp

              Filesize

              84KB

            • memory/784-19-0x0000000000950000-0x0000000000965000-memory.dmp

              Filesize

              84KB

            • memory/784-15-0x0000000000950000-0x0000000000965000-memory.dmp

              Filesize

              84KB

            • memory/2364-17-0x0000000000400000-0x000000000046D000-memory.dmp

              Filesize

              436KB

            • memory/2364-11-0x0000000000400000-0x000000000046D000-memory.dmp

              Filesize

              436KB

            • memory/2364-9-0x00000000006A0000-0x00000000007A0000-memory.dmp

              Filesize

              1024KB

            • memory/2364-10-0x00000000004F0000-0x0000000000503000-memory.dmp

              Filesize

              76KB

            • memory/4836-18-0x0000000000510000-0x0000000000610000-memory.dmp

              Filesize

              1024KB

            • memory/4836-1-0x0000000000510000-0x0000000000610000-memory.dmp

              Filesize

              1024KB

            • memory/4836-6-0x0000000000400000-0x000000000046D000-memory.dmp

              Filesize

              436KB

            • memory/4836-3-0x0000000000400000-0x000000000046D000-memory.dmp

              Filesize

              436KB

            • memory/4836-2-0x0000000000630000-0x0000000000643000-memory.dmp

              Filesize

              76KB