Analysis
-
max time kernel
5s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe
-
Size
13.5MB
-
MD5
9d96d9c5193edd88a9d0186b176ce37c
-
SHA1
2bb0f83db1e961217eaf2c4a9ffbf638fd9e22e8
-
SHA256
996e55ff7dfab4bdc3cd2bd847658ac6da3c5a1e8634e5e9d0e64bcb784ea52b
-
SHA512
d254a77387342070434f346f52faf1cb5ceca3df4d6331eb558685704f180774ad64be410923db6cba0c30978df07cd40e50f99bb85fd7d98e836300c367f8bb
-
SSDEEP
3072:zLBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:6OMdRQr7OB0ypmMXnl8XEPM3noSWOC
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2712 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1432 sc.exe 4324 sc.exe 4728 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 412 2256 WerFault.exe 82 4932 2416 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\agajdzzs\2⤵PID:1464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oqjubjxn.exe" C:\Windows\SysWOW64\agajdzzs\2⤵PID:4928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create agajdzzs binPath= "C:\Windows\SysWOW64\agajdzzs\oqjubjxn.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1432
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description agajdzzs "wifi internet conection"2⤵
- Launches sc.exe
PID:4324
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start agajdzzs2⤵
- Launches sc.exe
PID:4728
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 5962⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\agajdzzs\oqjubjxn.exeC:\Windows\SysWOW64\agajdzzs\oqjubjxn.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-01-29_9d96d9c5193edd88a9d0186b176ce37c_mafia.exe"1⤵PID:2416
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 5122⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2256 -ip 22561⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2416 -ip 24161⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.9MB
MD58d0341e2f29fe413381e62419f0c517d
SHA13d245dae612e7854a68ccf35644e2e9009bd31a5
SHA256053fabc1ed76327272fb89724448f254a98cd8e62b266e0f70a1747ef8f8cc30
SHA5129ce23b8d972dcbb8ac6269dee84dbf55281d0abe3bfeb892c05745d18da9cf2a7d21759df50b6e718ccd5833cef94ab29bb3c136c7e5242f80b1da9b93bc5403