Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 13:39
Static task
static1
Behavioral task
behavioral1
Sample
c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe
Resource
win7-20241010-en
General
-
Target
c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe
-
Size
4.8MB
-
MD5
c3c762bdf1f673328017ec983249e09e
-
SHA1
64dc43657c00deb05ad6af004e413b5f79b045a6
-
SHA256
c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78
-
SHA512
7bc0addbea5a3616cf8ed9886c49719d60b2d04e8c9406a1c1f3b382cc3fa4f980882533509fbd98d15ca76735922e56d54762e3402cefbd185721ef5048b8e2
-
SSDEEP
98304:kK/ZoaObB9IEBiDvXCh3YKxugzUHU9Mrfmr8hYE7j+RJ5HHuQB:P/usEBKeHNN1IvjaJ5HHuS
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Signatures
-
Tofsee family
-
Executes dropped EXE 3 IoCs
pid Process 3208 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 4892 msn.exe 2896 msn.exe -
Loads dropped DLL 8 IoCs
pid Process 3208 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 4892 msn.exe 4892 msn.exe 4892 msn.exe 2896 msn.exe 2896 msn.exe 2896 msn.exe 972 DockerCloud_Vtm_x86.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 1696 2896 msn.exe 85 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Serviceprotect_xd.job cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DockerCloud_Vtm_x86.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4892 msn.exe 2896 msn.exe 2896 msn.exe 1696 cmd.exe 1696 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2896 msn.exe 1696 cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3208 2984 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 82 PID 2984 wrote to memory of 3208 2984 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 82 PID 3208 wrote to memory of 4892 3208 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 83 PID 3208 wrote to memory of 4892 3208 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 83 PID 3208 wrote to memory of 4892 3208 c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe 83 PID 4892 wrote to memory of 2896 4892 msn.exe 84 PID 4892 wrote to memory of 2896 4892 msn.exe 84 PID 4892 wrote to memory of 2896 4892 msn.exe 84 PID 2896 wrote to memory of 1696 2896 msn.exe 85 PID 2896 wrote to memory of 1696 2896 msn.exe 85 PID 2896 wrote to memory of 1696 2896 msn.exe 85 PID 2896 wrote to memory of 1696 2896 msn.exe 85 PID 1696 wrote to memory of 972 1696 cmd.exe 94 PID 1696 wrote to memory of 972 1696 cmd.exe 94 PID 1696 wrote to memory of 972 1696 cmd.exe 94 PID 1696 wrote to memory of 972 1696 cmd.exe 94 PID 1696 wrote to memory of 972 1696 cmd.exe 94 PID 1696 wrote to memory of 972 1696 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe"C:\Users\Admin\AppData\Local\Temp\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\TEMP\{94878698-63A1-4680-8210-E0EA5D29F3E4}\.cr\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe"C:\Windows\TEMP\{94878698-63A1-4680-8210-E0EA5D29F3E4}\.cr\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe" -burn.filehandle.attached=588 -burn.filehandle.self=5922⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\TEMP\{222243A0-67CF-4959-89E4-CA6106273495}\.ba\msn.exeC:\Windows\TEMP\{222243A0-67CF-4959-89E4-CA6106273495}\.ba\msn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\superUpdate\msn.exeC:\Users\Admin\AppData\Roaming\superUpdate\msn.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\DockerCloud_Vtm_x86.exeC:\Users\Admin\AppData\Local\Temp\DockerCloud_Vtm_x86.exe6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:972
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD5de0ea31558536ca7e3164c3cd4578bf5
SHA15cc890c3ade653bb1ed1e53dabb0410602ee52df
SHA2566e599490e164505af796569dce30e18218b179b2b791fe69764892b3ed3e7478
SHA512c47299cd5f3b4961f423c2ca1fef5a33eb4b0f63dc232af70ef9da39f6f82270406061dd543461de7e47abd1244e26d6190de6035120211b27d4c23f97a25aba
-
Filesize
1.7MB
MD53b5835f6ee9c9e8c39c755ff825baeaf
SHA1b298d4c45f47c0fce3f052c4bf9314a9b118aeca
SHA25667dd9b4697606a673bea56e7d82c50f0311b0f3cdfb1dc921b70fbf7fe5c5e95
SHA5129c8e2200a2aa27f790d7c6a689c8a1e457bfc7034dd15035a771f0df3f1299d1e3092d2b3bcad349d10f11b1a10452fe8b763323218053ed5e0cc8762e2f7047
-
Filesize
331KB
MD554ee6a204238313dc6aca21c7e036c17
SHA1531fd1c18e2e4984c72334eb56af78a1048da6c7
SHA2560abf68b8409046a1555d48ac506fd26fda4b29d8d61e07bc412a4e21de2782fd
SHA51219a2e371712aab54b75059d39a9aea6e7de2eb69b3ffc0332e60df617ebb9de61571b2ca722cddb75c9cbc79f8200d03f73539f21f69366eae3c7641731c7820
-
Filesize
35KB
MD5c3672decd0ac72b95d213688a3897bd3
SHA13cf5a509286cc25ec826804f8f980c1e4fef5db1
SHA256cad394c34b47a31755ed12504186349cd9263de83562f80fc1256a9d58dd0099
SHA5120c04811a235c8dfb54af4d589b9b12966f42b57bf5a50ec55f64ec024fd700a8141f86bb3d7a1bc19be060f473cdfe674cbdf55c1054c8fc84e9a43b46d3b5e3
-
Filesize
1.1MB
MD50d1cbed13e0e06a5a672770d445875e1
SHA1a13bd4be50d664040dc4edb923f09289f4d644d8
SHA25608735bd27d0226052dd1ed311f050bed6fe5f5cbc9f6f72aca5633ebc04f793a
SHA5122170171636751a04201e406993c6d889b9c561855d5ad32027808f0c64866855f9872b5e53a6d618c9f1f8597c64275e1d04f35855ccaad09b4b0608dac166cf
-
Filesize
791KB
MD5ef66829b99bbfc465b05dc7411b0dcfa
SHA1c6f6275f92053b4b9fa8f2738ed3e84f45261503
SHA256257e6489f5b733f2822f0689295a9f47873be3cec5f4a135cd847a2f2c82a575
SHA5126839b7372e37e67c270a4225f91df21f856158a292849da2101c2978ce37cd08b75923ab30ca39d7360ce896fc6a2a2d646dd88eb2993cef612c43a475fdb2ea
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
156KB
MD52d1baab8d4466d742f529fdde392f166
SHA1f898d9128b340080437995f41856b16768b1811a
SHA256036b59a5f388ad0730931fcdda71996481f4128470836f71f78ece60ca3da981
SHA5124c98d762fcfe93e82d6c146fcb8a1834b6eea53b458ea093fa807c4d9d666440f1b91208f511d55511a81b1857484cccff233880e11156441348b156a377803e
-
Filesize
5.5MB
MD5537915708fe4e81e18e99d5104b353ed
SHA1128ddb7096e5b748c72dc13f55b593d8d20aa3fb
SHA2566dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74
SHA5129ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2
-
Filesize
982KB
MD598c1e156d6e2f4fc8ac9689c27843b25
SHA141f2fd6f1feba6fb941233c5d3cf9be9a455b146
SHA2569ca41837bbdf1b67dbf8df112c05a49c972542d2e0341d5c6eebc18905b14876
SHA512176e1d4ae9e4636903912adfa014bb2947bdde4c4db33395dd151220638fea60148a811c6e0e5e0e694f5333ef261194f980e7c0c49fedafabcdf12623d3c3b6
-
C:\Windows\Temp\{94878698-63A1-4680-8210-E0EA5D29F3E4}\.cr\c2d94e9579a169f3ccc2003ffb38e69d4c1471f6c24b199adeeb3d88d15c5f78.exe
Filesize4.6MB
MD5948fc9904a7496ff29524521ff508f10
SHA1aa69cab61561a3f0196a3e35c52131cf23903e01
SHA2566287cc61bd336510edfaa48148ba9f0b32dc5eed18a3387f3bbddca70fde0faf
SHA512324c95574e2ac88a5b75526a8c8b395c8f9d052d3a02f7177dfd0f138c3938d5af29fea7e0720274758faed0686ed1b403fab5615420a556f8236188c30d8aa9