Behavioral task
behavioral1
Sample
8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ecN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ecN.exe
Resource
win10v2004-20240802-en
General
-
Target
8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ecN
-
Size
71KB
-
MD5
ea08cac77aa15c1742504a58c8f00180
-
SHA1
f7b023d2a29ca6c19ed669e0f73c8f5f84dc4379
-
SHA256
8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ec
-
SHA512
303bc40c4e06c4479260b42c9ea9b8f38502a0dd3f98de06767762690978d49bdefa12c370151a9338996109f7dea8a2140ae28837b884ed65287f42b0ebefa3
-
SSDEEP
1536:Dkes21VCy1nTxSYg3CXTjFWL9o5dpIHUc:DDVCyFxSYACXFppI0
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Tofsee family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ecN
Files
-
8f068c21f73b64644779c6d31a47f4014ad4dbf0d958cd3fb673b6617ca6e2ecN.exe windows:5 windows x86 arch:x86
0bdef4d92a94790d7d279561a490c5bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ioctlsocket
__WSAFDIsSet
WSAStartup
send
connect
setsockopt
bind
listen
accept
getsockname
htonl
gethostname
socket
select
recv
ntohs
htons
sendto
gethostbyaddr
inet_ntoa
gethostbyname
inet_addr
getpeername
closesocket
dbghelp
StackWalk64
kernel32
GetVolumeInformationA
GetComputerNameA
GetTickCount
GetCurrentProcess
GetModuleHandleA
GetSystemInfo
GetVersionExA
lstrcmpiA
lstrlenA
Sleep
lstrcpynA
InterlockedExchange
GetCurrentThreadId
ExitProcess
GetOverlappedResult
WaitForSingleObject
GetLastError
WriteFile
ReadFile
CreateFileA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
CloseHandle
LoadLibraryA
GetEnvironmentVariableA
DeleteFileA
IsBadWritePtr
IsBadCodePtr
lstrcpyA
lstrcmpA
VirtualProtect
IsBadReadPtr
VirtualFree
WriteProcessMemory
VirtualAllocEx
VirtualAlloc
SetFilePointer
GetFileSize
SetFileAttributesA
GetDiskFreeSpaceA
GetWindowsDirectoryA
GetProcAddress
LocalFree
GetFileAttributesExA
LocalAlloc
CreateProcessA
GetTempPathA
SystemTimeToFileTime
GetSystemTime
DeviceIoControl
CreateFileW
GetModuleFileNameA
ResumeThread
SetThreadContext
TerminateProcess
GetThreadContext
lstrcatA
CreateThread
GetDriveTypeA
GetCommandLineA
SetUnhandledExceptionFilter
SetErrorMode
InterlockedIncrement
GetLocalTime
GetTimeZoneInformation
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
HeapSize
GetSystemTimeAsFileTime
MultiByteToWideChar
lstrlenW
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
FreeLibrary
CreateEventA
GetSystemDirectoryA
user32
wsprintfA
CharToOemA
advapi32
ConvertSidToStringSidA
AllocateAndInitializeSid
CreateProcessWithLogonW
RegCreateKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegDeleteValueA
RegGetKeySecurity
RegSetKeySecurity
RegSetValueExA
GetLengthSid
GetFileSecurityA
GetSecurityDescriptorOwner
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetFileSecurityA
GetSecurityDescriptorDacl
GetAce
DeleteAce
SetSecurityDescriptorDacl
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
GetUserNameW
LookupAccountNameW
LookupAccountNameA
GetUserNameA
RegCloseKey
CheckTokenMembership
FreeSid
shell32
ShellExecuteA
ShellExecuteExW
oleaut32
SysAllocStringByteLen
Sections
.text Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ