Analysis
-
max time kernel
1s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe
-
Size
12.2MB
-
MD5
8614dd7f7e2db20e233fd456212d78f9
-
SHA1
bf6d968a0d9ca44dc10e7e7ee73e3d4c19b386ba
-
SHA256
2fd8f88bc46e5e872b6c915dc29ffa177befb1c1133d3bab1191d3a40e528a7c
-
SHA512
d84c4099832f7bae96e521586ed2a571850c928b330690e97ab8ca4b1f4b537405fc04fd857ddd85655e1fb56461973bf0d5efbf9a18f620736017b09e4375a0
-
SSDEEP
393216:VXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2576 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4652 sc.exe 1948 sc.exe 624 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\otugklrj\2⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bdyexku.exe" C:\Windows\SysWOW64\otugklrj\2⤵PID:4880
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create otugklrj binPath= "C:\Windows\SysWOW64\otugklrj\bdyexku.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description otugklrj "wifi internet conection"2⤵
- Launches sc.exe
PID:1948
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start otugklrj2⤵
- Launches sc.exe
PID:624
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2576
-
-
C:\Windows\SysWOW64\otugklrj\bdyexku.exeC:\Windows\SysWOW64\otugklrj\bdyexku.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-01-29_8614dd7f7e2db20e233fd456212d78f9_mafia.exe"1⤵PID:3184
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53c8a9307bcd9aaa961842a3cc04dd593
SHA1a4a7db86a7e0a40d8e4a90d5e1b229b47aec5725
SHA25658bc170546932d64e9ec473d3c71e8cb9a2f8e79bcd7eb96400222f6809d40e0
SHA512ad33feccda49e07920230b41fb28435e5fbcf0ff8b82274c3308083d31861e8afcfe047ba395b268c0d4d22aac8dc4b542d7d6d6eeb80074d86bf4aa1e332f9c
-
Filesize
845KB
MD536157482efbea3f94c9bb026e13b7b87
SHA149a292a6a280348111d817911733d07be83561cb
SHA256181fb75b99afb13418fc9cff0e6d75b9d0362d0b839c307570b335e53c96f3f5
SHA512cf24f8a0a07f42a6f09123631d56afdcb6a73852cf680e6b895556c03bc49367e05d05f41076803f167c3bbfa77bac9f13b097ac06667923a76513e98c0330e4