Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2024 19:01

General

  • Target

    2024-06-26_63d4972da8508414258d10652266b321_mafia.exe

  • Size

    14.3MB

  • MD5

    63d4972da8508414258d10652266b321

  • SHA1

    f21948cf071c65e274ccda5d7f5f24692f094f22

  • SHA256

    55eb0162f40757a5f2183e8bea7f3914f28830bcc01e41ccb87709fc5c82e599

  • SHA512

    7167f8e04a409a8f913cd9a4f896154a31d152fd53f998af56b3fd9bb7771a2afef0189a4c702f99b1ecf47f8d34ea2de99a1b5dc14b84df946d0b8f73c0784d

  • SSDEEP

    6144:P+rWO2zeSPDjMXMH7Ll4aFpWVqIwUAP97GEwHrG2+e1x2:P+r1IeSXMXc7LlxWV4Ug97GZ+ej

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-26_63d4972da8508414258d10652266b321_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-26_63d4972da8508414258d10652266b321_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jvtblyqh\
      2⤵
        PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ccbhsgnq.exe" C:\Windows\SysWOW64\jvtblyqh\
        2⤵
          PID:2912
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create jvtblyqh binPath= "C:\Windows\SysWOW64\jvtblyqh\ccbhsgnq.exe /d\"C:\Users\Admin\AppData\Local\Temp\2024-06-26_63d4972da8508414258d10652266b321_mafia.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2540
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description jvtblyqh "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2644
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start jvtblyqh
          2⤵
          • Launches sc.exe
          PID:2536
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2572
      • C:\Windows\SysWOW64\jvtblyqh\ccbhsgnq.exe
        C:\Windows\SysWOW64\jvtblyqh\ccbhsgnq.exe /d"C:\Users\Admin\AppData\Local\Temp\2024-06-26_63d4972da8508414258d10652266b321_mafia.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:1500

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ccbhsgnq.exe
        Filesize

        13.6MB

        MD5

        4f01d55cdfef16d3ee9d6f2b7685e5d0

        SHA1

        f5acec53c35131683e28762bd5bcb48762e57701

        SHA256

        fafeff4c73bb887478087a48d66a8221809e5cd4dc643e92397a3fa00fe6036a

        SHA512

        769f8136bfa77baf50ed7c5ea301dcc026b1a5609588de1968a69a63d04fa6795f1e11ca339bdc39572a51e410538d706dde7793e2b4a62afe33e9af370c0b5d

      • memory/1500-14-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1500-12-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1500-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/1500-9-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/1500-16-0x0000000000080000-0x0000000000095000-memory.dmp
        Filesize

        84KB

      • memory/2196-1-0x0000000000690000-0x0000000000790000-memory.dmp
        Filesize

        1024KB

      • memory/2196-3-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/2196-8-0x0000000000400000-0x0000000000415000-memory.dmp
        Filesize

        84KB

      • memory/2196-7-0x0000000000400000-0x000000000051A000-memory.dmp
        Filesize

        1.1MB

      • memory/2656-15-0x0000000000400000-0x000000000051A000-memory.dmp
        Filesize

        1.1MB