Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 04:16

General

  • Target

    ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334.exe

  • Size

    10.6MB

  • MD5

    48d331a22042af3c46f4a5c5852fd973

  • SHA1

    144c9fbab74bfa069d42f895d84cd0573d5e5582

  • SHA256

    ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334

  • SHA512

    64d36047c7e0d92054eac6b44eae05ada08e7fb5febbb5a2ae6b7a07ebdc9bd31ebd0391b490957362d1c3727986591bdcb0598111967c4b94e1b895f8b71026

  • SSDEEP

    6144:CKNDMp7tMWhHwXO3kyvzC0+9XFWYW///////////////////////////////////:CKNDMpOmHKcRv+0u

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334.exe
    "C:\Users\Admin\AppData\Local\Temp\ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ybehcufl\
      2⤵
        PID:1904
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\audnadiu.exe" C:\Windows\SysWOW64\ybehcufl\
        2⤵
          PID:5748
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create ybehcufl binPath= "C:\Windows\SysWOW64\ybehcufl\audnadiu.exe /d\"C:\Users\Admin\AppData\Local\Temp\ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2756
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description ybehcufl "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4672
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start ybehcufl
          2⤵
          • Launches sc.exe
          PID:1424
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 888
          2⤵
          • Program crash
          PID:5596
      • C:\Windows\SysWOW64\ybehcufl\audnadiu.exe
        C:\Windows\SysWOW64\ybehcufl\audnadiu.exe /d"C:\Users\Admin\AppData\Local\Temp\ae94bcdff4c4db9cd6aaa662d87f6b3bc9b1de7a786156307c42aad4f4d72334.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:5480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 440
          2⤵
          • Program crash
          PID:3664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2860 -ip 2860
        1⤵
          PID:4880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4392 -ip 4392
          1⤵
            PID:5324

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\audnadiu.exe
            Filesize

            14.6MB

            MD5

            2cbd031c82ba7939e39057a6f24d3a00

            SHA1

            ad3c8e2f51bd5ad85ec4030e232097a38029fe8e

            SHA256

            20ab515e9396ece18f7dc91c16c8a0c3f9e227418937fa87a846ac6aec5e2d91

            SHA512

            d204a143c68f221b4499694441c69f68bfa9cd0b3c46544427083bdb2e8603e628b7193f79f73099b5ef6c50bb8c4127cccd3699910f616bc35eeff1e9e67856

          • memory/2860-1-0x00007FFA2D1B0000-0x00007FFA2D3A5000-memory.dmp
            Filesize

            2.0MB

          • memory/2860-7-0x00007FFA2D1B0000-0x00007FFA2D3A5000-memory.dmp
            Filesize

            2.0MB

          • memory/2860-6-0x0000000000400000-0x000000000086C000-memory.dmp
            Filesize

            4.4MB

          • memory/4392-11-0x00007FFA2D1B0000-0x00007FFA2D3A5000-memory.dmp
            Filesize

            2.0MB

          • memory/4392-13-0x0000000000400000-0x000000000086C000-memory.dmp
            Filesize

            4.4MB

          • memory/5480-8-0x0000000000120000-0x0000000000135000-memory.dmp
            Filesize

            84KB

          • memory/5480-10-0x0000000000120000-0x0000000000135000-memory.dmp
            Filesize

            84KB

          • memory/5480-12-0x0000000000120000-0x0000000000135000-memory.dmp
            Filesize

            84KB