Analysis
-
max time kernel
3s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe
-
Size
12.7MB
-
MD5
d843097807b69f23d9e9b92c78a6aef6
-
SHA1
b169759391428e792bf917b88eac0d08a96a2e0d
-
SHA256
71c8fa2e70bca29e60ee2f1dfcf36248aee5b23025b4aec2ecb20e5954a434d7
-
SHA512
76fd4d1f5fb81d17e25ae675b29c5f947ab87c6a26250e29ec07bb821ea0310b7ed1d98d90e56da95968aef0fb821aa9632391d1d33ba05c1823331eaa8d0674
-
SSDEEP
3072:4LBgXOXcdW8tar7vGdq8c7YMl2b8anmMXnb58XuDP9het3Zv1oSW1za2E+w5C2/Y:1OMdRQr7OB0ypmMXnl8XEPM3noSWOC
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4192 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4580 sc.exe 4160 sc.exe 4776 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3188 3724 WerFault.exe 81 4024 2116 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wiklzxek\2⤵PID:3520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xfuyljss.exe" C:\Windows\SysWOW64\wiklzxek\2⤵PID:4464
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wiklzxek binPath= "C:\Windows\SysWOW64\wiklzxek\xfuyljss.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wiklzxek "wifi internet conection"2⤵
- Launches sc.exe
PID:4580
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wiklzxek2⤵
- Launches sc.exe
PID:4160
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 10402⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\wiklzxek\xfuyljss.exeC:\Windows\SysWOW64\wiklzxek\xfuyljss.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-01-29_d843097807b69f23d9e9b92c78a6aef6_mafia.exe"1⤵PID:2116
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 5082⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3724 -ip 37241⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2116 -ip 21161⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD5b2013aa86c08c8bca1667cf56046dd69
SHA1fbefa8eb75caabc66e061b75f18a6e66f7ffb45b
SHA2569059e00da0dba4bef89575a1b2f58a63ebabd387a218ac646896d1c503a7e62e
SHA512ef2c6d81408b75ea47fbc447e97cda4f7c346d1012bd552521ef13665efca3acb8963a151e988253ddf76a9dc4eeb5077af677862d3e075fc6ce101ea251cd3d
-
Filesize
682KB
MD587f7ba8eceedd6109a254cbbb194d9cc
SHA1fccf7d9b7cd6751a6ab401f5b5f5768ee8cde9fe
SHA2567c0b9ac8ac926e526616af6e735cabc89a4b611be13554f9d1028bafb5261405
SHA51275e359de68e263d5d61b50284244ce4639869395cb062f63ba7a98f06406fda7baf39a8861ab139b4b705bcfc31e9588be9c24257c4cc62ddf7a803663e785a7