Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 21:10
Static task
static1
Behavioral task
behavioral1
Sample
26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe
Resource
win10v2004-20241007-en
General
-
Target
26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe
-
Size
152KB
-
MD5
6f352302073de0e2bfe05dbfb220d074
-
SHA1
c36f3014baf28b7667612752e025cf138b448f55
-
SHA256
26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6
-
SHA512
5a9af4c6682a681732ec8c603bf146ce86d7cc698dfdde744245156c887399d65bc38d2bd4ac2075ed86088a4539c2f252a337abd04ce7beb71d8913e8208677
-
SSDEEP
1536:oqJVtDbTMSjRZqsAONjZmZ9wkPGdkD8Vyzt/86My6n27InSJd:okTMNINjZBNkwmt/Ksd
Malware Config
Extracted
tofsee
103.9.150.244
188.190.120.102
121.127.250.203
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe -
Executes dropped EXE 2 IoCs
pid Process 1056 dewuuogt.exe 4832 dewuuogt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\dewuuogt.exe\"" 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3936 set thread context of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 1056 set thread context of 4832 1056 dewuuogt.exe 87 PID 4832 set thread context of 1480 4832 dewuuogt.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 808 1480 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dewuuogt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dewuuogt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 1056 dewuuogt.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 3936 wrote to memory of 4460 3936 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 83 PID 4460 wrote to memory of 1056 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 84 PID 4460 wrote to memory of 1056 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 84 PID 4460 wrote to memory of 1056 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 84 PID 4460 wrote to memory of 972 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 85 PID 4460 wrote to memory of 972 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 85 PID 4460 wrote to memory of 972 4460 26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe 85 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 1056 wrote to memory of 4832 1056 dewuuogt.exe 87 PID 4832 wrote to memory of 1480 4832 dewuuogt.exe 88 PID 4832 wrote to memory of 1480 4832 dewuuogt.exe 88 PID 4832 wrote to memory of 1480 4832 dewuuogt.exe 88 PID 4832 wrote to memory of 1480 4832 dewuuogt.exe 88 PID 4832 wrote to memory of 1480 4832 dewuuogt.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe"C:\Users\Admin\AppData\Local\Temp\26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe"C:\Users\Admin\AppData\Local\Temp\26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\dewuuogt.exe"C:\Users\Admin\dewuuogt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\dewuuogt.exe"C:\Users\Admin\dewuuogt.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 3566⤵
- Program crash
PID:808
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0043.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1480 -ip 14801⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5dea0722044ce550b65e5614d8a261066
SHA10db60881a89b3231e98b962428ee0a8fdaf660e5
SHA256222b69a64ae360e45207a5209faae3a720c6fec44b6fed0032130dcb1172709d
SHA512ff50a36bf75a4a1182b280793a03e26cd5388d1d927afffed08f0cbf01cefe1fbbd37b7d0c0bc0b5cceea1190004e3c906d6e296bfcb87d45e50ee5b22df5ef6
-
Filesize
37.8MB
MD5179c0f656db10fc6c2327e371e0a19ce
SHA11af5aba4322310a8c943e114c2a8afdabd4671b2
SHA25644f1801beca76d4fedfb2aa157f7c19b93c3db5f21b95862a8c835cd11875d68
SHA512a597d7b2a3c412d03ae71a77e6cf1417ab539d1fc45f63fdda32cc552ddb8ea5caf35b37a89ab901bd6e5d1c9f4e631b68a985e1cd214d4bd8650348d3e01f1d