Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 02:39

General

  • Target

    f27e816769871147e4862997714586f5_JaffaCakes118.exe

  • Size

    12.7MB

  • MD5

    f27e816769871147e4862997714586f5

  • SHA1

    6bc7cbca3c705c9da9890a8f4f5d22d273c1105a

  • SHA256

    1cb4511945d33d1414e7edf75f28952256df660a4d70e5599d8d0c653a9c44fc

  • SHA512

    710979b0bbb44401ae36b4f37d62257c5616317e6a9c66b797f10dc2b7e4f02e39a36cbd54134933c8bf6c528d79926041c66cd418d27b1ed60a9c4e35af364c

  • SSDEEP

    24576:qTmCUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUg:9

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\teichouo\
      2⤵
        PID:5056
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bsovmlpt.exe" C:\Windows\SysWOW64\teichouo\
        2⤵
          PID:4816
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create teichouo binPath= "C:\Windows\SysWOW64\teichouo\bsovmlpt.exe /d\"C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2368
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description teichouo "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2748
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start teichouo
          2⤵
          • Launches sc.exe
          PID:1884
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 644
          2⤵
          • Program crash
          PID:3980
      • C:\Windows\SysWOW64\teichouo\bsovmlpt.exe
        C:\Windows\SysWOW64\teichouo\bsovmlpt.exe /d"C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:3860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 508
          2⤵
          • Program crash
          PID:836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3728 -ip 3728
        1⤵
          PID:1844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2444 -ip 2444
          1⤵
            PID:3012

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\bsovmlpt.exe

            Filesize

            12.1MB

            MD5

            7b8119dcb72359cc3f10e908abdf5c8c

            SHA1

            c47a0b7d22d21d1b42288bd581f40c9e674b8330

            SHA256

            e07fbac69955586fd1e923bf50af719de00640048d6ad8ae7c4c6efe7b56ff22

            SHA512

            d8beff771b58fcb9c8e37ca89de7d5007abeba040143572b24c87c030acfe0285c0e14d92565708af765e07ce206b460ca8f21122e04a517f6133049c5bd28e5

          • memory/2444-9-0x0000000004260000-0x0000000004360000-memory.dmp

            Filesize

            1024KB

          • memory/2444-16-0x0000000000400000-0x00000000040F8000-memory.dmp

            Filesize

            61.0MB

          • memory/3728-1-0x0000000004380000-0x0000000004480000-memory.dmp

            Filesize

            1024KB

          • memory/3728-2-0x00000000041D0000-0x00000000041E3000-memory.dmp

            Filesize

            76KB

          • memory/3728-6-0x0000000000400000-0x00000000040F8000-memory.dmp

            Filesize

            61.0MB

          • memory/3728-7-0x00000000041D0000-0x00000000041E3000-memory.dmp

            Filesize

            76KB

          • memory/3860-10-0x0000000000810000-0x0000000000825000-memory.dmp

            Filesize

            84KB

          • memory/3860-14-0x0000000000810000-0x0000000000825000-memory.dmp

            Filesize

            84KB

          • memory/3860-15-0x0000000000810000-0x0000000000825000-memory.dmp

            Filesize

            84KB

          • memory/3860-17-0x0000000000810000-0x0000000000825000-memory.dmp

            Filesize

            84KB