Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe
Resource
win10v2004-20241007-en
General
-
Target
ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe
-
Size
355KB
-
MD5
1d5d4b18e2f0f03c8de6d08390dc192c
-
SHA1
f76fe6a8dd3a26d51a94c7a44e93f549bd182518
-
SHA256
ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201
-
SHA512
e0a12427841f8c2f4f3655f0a42a210d5ae79bdb51d4a351315a800653b786ce2257600da7f3e2a592c65146594e06fa9cee68ff9dd62a991fa909f1fee4313d
-
SSDEEP
6144:hvo5HY2USvj5R/i2gCiX0oH1VmyerYDn1QqaFZczX3V5wRjejHH5TAb5:hA5HY2USr5R/i2gCy0oVVmyerK1/aFZ7
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\kiunrspz = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2980 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kiunrspz\ImagePath = "C:\\Windows\\SysWOW64\\kiunrspz\\kngomowg.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2960 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 kngomowg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2832 set thread context of 2960 2832 kngomowg.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2332 sc.exe 2876 sc.exe 1796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kngomowg.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2120 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 30 PID 2412 wrote to memory of 2120 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 30 PID 2412 wrote to memory of 2120 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 30 PID 2412 wrote to memory of 2120 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 30 PID 2412 wrote to memory of 2212 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 32 PID 2412 wrote to memory of 2212 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 32 PID 2412 wrote to memory of 2212 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 32 PID 2412 wrote to memory of 2212 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 32 PID 2412 wrote to memory of 2332 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 34 PID 2412 wrote to memory of 2332 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 34 PID 2412 wrote to memory of 2332 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 34 PID 2412 wrote to memory of 2332 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 34 PID 2412 wrote to memory of 2876 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 36 PID 2412 wrote to memory of 2876 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 36 PID 2412 wrote to memory of 2876 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 36 PID 2412 wrote to memory of 2876 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 36 PID 2412 wrote to memory of 1796 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 38 PID 2412 wrote to memory of 1796 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 38 PID 2412 wrote to memory of 1796 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 38 PID 2412 wrote to memory of 1796 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 38 PID 2412 wrote to memory of 2980 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 41 PID 2412 wrote to memory of 2980 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 41 PID 2412 wrote to memory of 2980 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 41 PID 2412 wrote to memory of 2980 2412 ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe 41 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43 PID 2832 wrote to memory of 2960 2832 kngomowg.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe"C:\Users\Admin\AppData\Local\Temp\ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kiunrspz\2⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kngomowg.exe" C:\Windows\SysWOW64\kiunrspz\2⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kiunrspz binPath= "C:\Windows\SysWOW64\kiunrspz\kngomowg.exe /d\"C:\Users\Admin\AppData\Local\Temp\ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kiunrspz "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kiunrspz2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\kiunrspz\kngomowg.exeC:\Windows\SysWOW64\kiunrspz\kngomowg.exe /d"C:\Users\Admin\AppData\Local\Temp\ff21828fb3915046a904aca7876e98a8f994b2fcbf872d0eee15b0f025380201.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD5aae3ac34c6ffe9698358454d90372266
SHA126ceb7fe71dddeb121f00d63e2ed260f90353173
SHA25674233656815a047bc39e20a62187c9741863ef15aacceaf2ee161ad0e0b3fd24
SHA512b33d6814cb02ab172bc035121bde795a73286ea63aae3fb5d5e99737dd6c6053fbadaa8c5bc9f73d44695fa87ffaece4fd4197f19ca534193e603aabda18ab61