Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe
-
Size
14.9MB
-
MD5
8fae0351e92916053681e654ab099267
-
SHA1
da74e342fdd5c80d3b34e04f74369fcc088daa64
-
SHA256
b8e3d9a36d04a45c9cde5ae9f53d6fb709e599eee11a7396b9e2216fb7cb733d
-
SHA512
fb468556e5a71977e8cccb0a0f3680cfca513f823d1d3bc752776c26b920533165650d734aa2e18d9eed7c86eae9e3ed49e47e8584a54d816ae758a86d5b38a2
-
SSDEEP
49152:sLFuiE8888888888888888888888888888888888888888888888888888888888:sLM
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2096 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gvjgqgdy\ImagePath = "C:\\Windows\\SysWOW64\\gvjgqgdy\\qhpnxszn.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe -
Deletes itself 1 IoCs
pid Process 4736 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 qhpnxszn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 4736 4924 qhpnxszn.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4656 sc.exe 4996 sc.exe 4528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhpnxszn.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5640 wrote to memory of 400 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 88 PID 5640 wrote to memory of 400 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 88 PID 5640 wrote to memory of 400 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 88 PID 5640 wrote to memory of 3668 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 90 PID 5640 wrote to memory of 3668 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 90 PID 5640 wrote to memory of 3668 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 90 PID 5640 wrote to memory of 4528 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 92 PID 5640 wrote to memory of 4528 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 92 PID 5640 wrote to memory of 4528 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 92 PID 5640 wrote to memory of 4656 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 94 PID 5640 wrote to memory of 4656 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 94 PID 5640 wrote to memory of 4656 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 94 PID 5640 wrote to memory of 4996 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 100 PID 5640 wrote to memory of 4996 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 100 PID 5640 wrote to memory of 4996 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 100 PID 4924 wrote to memory of 4736 4924 qhpnxszn.exe 103 PID 4924 wrote to memory of 4736 4924 qhpnxszn.exe 103 PID 4924 wrote to memory of 4736 4924 qhpnxszn.exe 103 PID 4924 wrote to memory of 4736 4924 qhpnxszn.exe 103 PID 4924 wrote to memory of 4736 4924 qhpnxszn.exe 103 PID 5640 wrote to memory of 2096 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 104 PID 5640 wrote to memory of 2096 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 104 PID 5640 wrote to memory of 2096 5640 2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gvjgqgdy\2⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qhpnxszn.exe" C:\Windows\SysWOW64\gvjgqgdy\2⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gvjgqgdy binPath= "C:\Windows\SysWOW64\gvjgqgdy\qhpnxszn.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gvjgqgdy "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gvjgqgdy2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\gvjgqgdy\qhpnxszn.exeC:\Windows\SysWOW64\gvjgqgdy\qhpnxszn.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-03-30_8fae0351e92916053681e654ab099267_mafia_rhadamanthys.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4736
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD5b8ab1c140a7c6c3e66d1e763f0ac3de2
SHA104c0aff7f6e92d1c963d1ee6ce41f4fb23c3ccf3
SHA2562aaf402ce816c7bdd2000459ef98f7b02c7b2e13d1a101003f1aeee2d87d0c3f
SHA512b45386bf572344a584b317e72409fa3c3203d532d67fdc292e6316390d068b435f99323a1cbb39873421a2c46459ab3e98c43d027d22a4d502db1a46ed392629