Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
uvnllfxk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
uvnllfxk.exe
Resource
win10v2004-20241007-en
General
-
Target
uvnllfxk.exe
-
Size
34.1MB
-
MD5
2f681fe6591187ce3aaf014abc7f00b3
-
SHA1
3d69cf7428fc10ee601a9011ccee1719275987d9
-
SHA256
259dea5a8a0bf108c09339fea8da0c74fe0959175c56bb8c8d054c586a7128c3
-
SHA512
eb9ad3e9afe22e2004f6a3dc6abf267dcf84fbc2f7984e066435a0ec619af2361c92a732fa3f5213639fe4230808107d0b7b686feb4bd30cccc46ae213a380ac
-
SSDEEP
12288:KisnNo6S1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIS1SIu:V
Malware Config
Extracted
tofsee
94.242.250.149
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvnllfxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2556 uvnllfxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2588 2556 uvnllfxk.exe 31 PID 2556 wrote to memory of 2588 2556 uvnllfxk.exe 31 PID 2556 wrote to memory of 2588 2556 uvnllfxk.exe 31 PID 2556 wrote to memory of 2588 2556 uvnllfxk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\uvnllfxk.exe"C:\Users\Admin\AppData\Local\Temp\uvnllfxk.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6373.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD59a9e08671bcb7fe50ca3756c9cb083d0
SHA196fa3f6d106f6aa222132968d19de2683d8e1bf8
SHA25612a4d1d4eb3740fbe58b0a8b248f251f3d17155dce447dc9bdddefec8a68dbac
SHA512fa9c65a0799087294a304b12729c4a9d5c83758b9396febbad64b4c214404ea8a3c063aa2c3c04c56b1d18ba289cb165ff336b6c7667847d602c7365fd16d995