Analysis

  • max time kernel
    116s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 01:05

General

  • Target

    b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e.exe

  • Size

    10.2MB

  • MD5

    0a5435b0caf94bf65e29727f66456c25

  • SHA1

    76eb55c90ec530ed3969c4fffbf2a64196c90673

  • SHA256

    b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e

  • SHA512

    115278b35b2f5c4e93cc4ddcda82c61a6a2faf5bf58ada753eed8ab3afb110c407cc0dbcc175ecc4b245a9e0ce199df96cc8bb2d07e7f7b8b9659c7052119472

  • SSDEEP

    12288:EZv3F8h86NMcoGuc3FXE4WrIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIB:Ep3F8Au3FPW9

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e.exe
    "C:\Users\Admin\AppData\Local\Temp\b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cbtrqygp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rgtpbatf.exe" C:\Windows\SysWOW64\cbtrqygp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create cbtrqygp binPath= "C:\Windows\SysWOW64\cbtrqygp\rgtpbatf.exe /d\"C:\Users\Admin\AppData\Local\Temp\b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3456
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description cbtrqygp "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3224
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start cbtrqygp
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4904
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1308
      2⤵
      • Program crash
      PID:3164
  • C:\Windows\SysWOW64\cbtrqygp\rgtpbatf.exe
    C:\Windows\SysWOW64\cbtrqygp\rgtpbatf.exe /d"C:\Users\Admin\AppData\Local\Temp\b27e4f6888ead7b1bace259ebb494d540fe4d4398b176e53e7963222bdbbcc3e.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Sets service image path in registry
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 508
      2⤵
      • Program crash
      PID:2400
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4932 -ip 4932
    1⤵
      PID:3912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3744 -ip 3744
      1⤵
        PID:5080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\rgtpbatf.exe

        Filesize

        14.2MB

        MD5

        e5e1992b46b35bcfc3c30ea284fb9696

        SHA1

        9500b38adcfbc89ae7026819dbe10ae06a6b67e1

        SHA256

        6b5b34b5fe59e3666f7fd0f2af7fc242260185fce21b47d5b4b0be8357beb7d4

        SHA512

        c2beeb74fab0e65abe0c615cebb0fd25f2397e8fc78bf2b825d1947229e5a31cca2ecd258260f53f74f74cb7ae42c8cf566589c5472689365b3c5b6885ec8b6c

      • memory/1104-13-0x0000000000F30000-0x0000000000F45000-memory.dmp

        Filesize

        84KB

      • memory/1104-16-0x0000000000F30000-0x0000000000F45000-memory.dmp

        Filesize

        84KB

      • memory/1104-15-0x0000000000F30000-0x0000000000F45000-memory.dmp

        Filesize

        84KB

      • memory/3744-11-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/3744-12-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/3744-18-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/4932-9-0x0000000000680000-0x0000000000693000-memory.dmp

        Filesize

        76KB

      • memory/4932-8-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/4932-10-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/4932-2-0x0000000000680000-0x0000000000693000-memory.dmp

        Filesize

        76KB

      • memory/4932-3-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/4932-1-0x00000000006F0000-0x00000000007F0000-memory.dmp

        Filesize

        1024KB