Analysis
-
max time kernel
144s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
Resource
win10v2004-20241007-en
General
-
Target
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe
-
Size
176KB
-
MD5
5f7fe860cb3496ceec0ef338b6781f90
-
SHA1
941868e3c0fee15f6ecf3bd3429765f693a63dce
-
SHA256
71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532
-
SHA512
efb6c1bd50384285eb51805eb28b9dc62ad9b6fa5b7bbe0006d5bd142c7686be79249a33eb9466d292aa0a91611eeaaa285535bd0eb7bad7ad8649705695e479
-
SSDEEP
3072:+zE7torPMLERyENUYZ8EnfHsEdF9zbjbTrlMzLjrMsUzbjULt1dlGR1tldle/sYW:mEJAUgME57
Malware Config
Extracted
tofsee
103.246.115.238
188.190.114.20
112.213.106.187
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe -
Executes dropped EXE 2 IoCs
pid Process 4928 inmpfhsz.exe 2784 inmpfhsz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\inmpfhsz.exe\"" 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 560 set thread context of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 4928 set thread context of 2784 4928 inmpfhsz.exe 88 PID 2784 set thread context of 208 2784 inmpfhsz.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 208 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inmpfhsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inmpfhsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 4928 inmpfhsz.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 560 wrote to memory of 4152 560 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 84 PID 4152 wrote to memory of 4928 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 85 PID 4152 wrote to memory of 4928 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 85 PID 4152 wrote to memory of 4928 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 85 PID 4152 wrote to memory of 2896 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 86 PID 4152 wrote to memory of 2896 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 86 PID 4152 wrote to memory of 2896 4152 71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe 86 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 4928 wrote to memory of 2784 4928 inmpfhsz.exe 88 PID 2784 wrote to memory of 208 2784 inmpfhsz.exe 89 PID 2784 wrote to memory of 208 2784 inmpfhsz.exe 89 PID 2784 wrote to memory of 208 2784 inmpfhsz.exe 89 PID 2784 wrote to memory of 208 2784 inmpfhsz.exe 89 PID 2784 wrote to memory of 208 2784 inmpfhsz.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"C:\Users\Admin\AppData\Local\Temp\71cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\inmpfhsz.exe"C:\Users\Admin\inmpfhsz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\inmpfhsz.exe"C:\Users\Admin\inmpfhsz.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 3566⤵
- Program crash
PID:3520
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1073.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 208 -ip 2081⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5af07ec8d6fedfd395885c67ece9603a8
SHA198286975fe184a8f5de80d67924bc38204383346
SHA25679ef568ba5ec4183b2bc19db7aa587082c35eb1fb72b66de23f5f526fd93af68
SHA512597f46cc7ad962b889554ef05001c6870fa08e95224d7ea3cb12b64acbfe5c2f7f5ec972cf477422a1ee80644be27f0890f3723c5cc4adee1fef361ac68d7e76
-
Filesize
176KB
MD55f7fe860cb3496ceec0ef338b6781f90
SHA1941868e3c0fee15f6ecf3bd3429765f693a63dce
SHA25671cdbb0fb6224d66464401d027ed5810fd46fc05988b8b8f6e957ee15a137532
SHA512efb6c1bd50384285eb51805eb28b9dc62ad9b6fa5b7bbe0006d5bd142c7686be79249a33eb9466d292aa0a91611eeaaa285535bd0eb7bad7ad8649705695e479