Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
Resource
win10v2004-20241007-en
General
-
Target
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
-
Size
176KB
-
MD5
5f7fe860cb3496ceec0ef338b6781f90
-
SHA1
941868e3c0fee15f6ecf3bd3429765f693a63dce
-
SHA256
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532
-
SHA512
efb6c1bd50384285eb51805eb28b9dc62ad9b6fa5b7bbe0006d5bd142c7686be79249a33eb9466d292aa0a91611eeaaa285535bd0eb7bad7ad8649705695e479
-
SSDEEP
3072:+zE7torPMLERyENUYZ8EnfHsEdF9zbjbTrlMzLjrMsUzbjULt1dlGR1tldle/sYW:mEJAUgME57
Malware Config
Extracted
tofsee
103.246.115.238
188.190.114.20
112.213.106.187
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1800 chgjzbmt.exe 2592 chgjzbmt.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\chgjzbmt.exe\"" 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2088 set thread context of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 1800 set thread context of 2592 1800 chgjzbmt.exe 35 PID 2592 set thread context of 2724 2592 chgjzbmt.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chgjzbmt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chgjzbmt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 1800 chgjzbmt.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 2088 wrote to memory of 1996 2088 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 31 PID 1996 wrote to memory of 1800 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 32 PID 1996 wrote to memory of 1800 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 32 PID 1996 wrote to memory of 1800 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 32 PID 1996 wrote to memory of 1800 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 32 PID 1996 wrote to memory of 2220 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 33 PID 1996 wrote to memory of 2220 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 33 PID 1996 wrote to memory of 2220 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 33 PID 1996 wrote to memory of 2220 1996 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 33 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 1800 wrote to memory of 2592 1800 chgjzbmt.exe 35 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36 PID 2592 wrote to memory of 2724 2592 chgjzbmt.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\chgjzbmt.exe"C:\Users\Admin\chgjzbmt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\chgjzbmt.exe"C:\Users\Admin\chgjzbmt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3513.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5af07ec8d6fedfd395885c67ece9603a8
SHA198286975fe184a8f5de80d67924bc38204383346
SHA25679ef568ba5ec4183b2bc19db7aa587082c35eb1fb72b66de23f5f526fd93af68
SHA512597f46cc7ad962b889554ef05001c6870fa08e95224d7ea3cb12b64acbfe5c2f7f5ec972cf477422a1ee80644be27f0890f3723c5cc4adee1fef361ac68d7e76
-
Filesize
176KB
MD55f7fe860cb3496ceec0ef338b6781f90
SHA1941868e3c0fee15f6ecf3bd3429765f693a63dce
SHA25671cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532
SHA512efb6c1bd50384285eb51805eb28b9dc62ad9b6fa5b7bbe0006d5bd142c7686be79249a33eb9466d292aa0a91611eeaaa285535bd0eb7bad7ad8649705695e479