Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 21:03
Static task
static1
Behavioral task
behavioral1
Sample
270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe
Resource
win10v2004-20241007-en
General
-
Target
270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe
-
Size
94KB
-
MD5
78ecd98f4df225f36ad1bf18814c8360
-
SHA1
30e99fdb525eb0163e76c943e6db50b16dce38f7
-
SHA256
270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cb
-
SHA512
b3f3a9be6d66f697f262383553015be43bb427853399a1f774d4418d202898dd2bbdc1ef7edd899c576020746d6f2b6cd0c78d6318eb03f74a525cf8e6816aa6
-
SSDEEP
1536:HaT5HC7L9vnEexvevA17dfTWmU6WmQt8upcr/d:HaT5aLaexbditRtsrF
Malware Config
Extracted
tofsee
91.218.38.211
188.130.237.71
185.25.48.10
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Executes dropped EXE 1 IoCs
pid Process 1016 ansfkxqy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ansfkxqy.exe\"" 270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1016 set thread context of 3688 1016 ansfkxqy.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 4248 3688 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ansfkxqy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1016 1948 270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe 82 PID 1948 wrote to memory of 1016 1948 270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe 82 PID 1948 wrote to memory of 1016 1948 270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe 82 PID 1016 wrote to memory of 3688 1016 ansfkxqy.exe 83 PID 1016 wrote to memory of 3688 1016 ansfkxqy.exe 83 PID 1016 wrote to memory of 3688 1016 ansfkxqy.exe 83 PID 1016 wrote to memory of 3688 1016 ansfkxqy.exe 83 PID 1016 wrote to memory of 3688 1016 ansfkxqy.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe"C:\Users\Admin\AppData\Local\Temp\270e15b50f3eb2895ff790fba1b9137672639bbb75d08520c26933364ab010cbN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\ansfkxqy.exe"C:\Users\Admin\ansfkxqy.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 3684⤵
- Program crash
PID:4248
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0773.bat" "2⤵PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3688 -ip 36881⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5ec810792e03a6d1301b29fa59bc47325
SHA1db2f2b2daea6c8c4fece7a56ec632bebe31dad70
SHA256f68525075f9d1f5a20951682abedbd9400ab0cc35f8513e311c1f14edc1cc386
SHA51278689f139e741289cf934c117d27e6fde85b922c1df1d339a10874b5985d31c2a2e6537de93291da1f005336c7c2a5a362209f31f27b5ce31b269f8ccbe3f3a7
-
Filesize
22.6MB
MD53c7e5efeb5c0e05ed139e920eaaf22ea
SHA1bca4dd7c1aa3ad3a6805c3a6dc3bb8b339c9fe91
SHA256465b4d464189e169e83369a670bd90080dcdb7f2708a0dd001d51084f2f28c15
SHA512fea3e116aefbd520afcf9d2aada46f4c24e8fe4725dce03d2ac40f092bf496cc8452429838a3d75a8fe675286a27fd3f5543b6f210c52b0be1e17ea6e3ed2289
-
Filesize
21.6MB
MD5a12bd0ef54ed14b63287484385983bca
SHA17f3d7421b6dfed689f29ab745c4b135904b0315e
SHA25628ead443dc5425366b3a8e51b65d24425045243550d7c61e468290a1cf0c768d
SHA512259fb57cc0727a698321c6cadc09f11f0c613966f5712e5a783ea63a71eb3dcb1519a0a0a7dd79d85b627ba00c01ed1cf46918c7a8dee95d7775db9b994f714a