Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 11:27

General

  • Target

    f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe

  • Size

    13.2MB

  • MD5

    f36423b40d7a0bbc75a9d05f0e324e72

  • SHA1

    31f80e7d1cea645b288db9835c5e52b23fa103b2

  • SHA256

    e0e94c3fafd615c50c084cf4d72bb8f98495ad99ec2408289ae47322748120f7

  • SHA512

    fc6118271567c7697b09d7c0ef7acc50cd1867768fd06302533f96b83009c3f7f566813f20f555d628a9d2fc7c9756ca0115f32d534add97c8c66a03ed48b7a7

  • SSDEEP

    3072:Fdi8DS3tA2awlaR7/NDzFx2l0oHgBpMKwVTORO2j4UCtXGPjsjmw+V0+V0+V0+V+:a8DiApRRDzFxk0oHOpfws6Uprgp

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pqbsekoh\
      2⤵
        PID:2704
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\uthjxuvn.exe" C:\Windows\SysWOW64\pqbsekoh\
        2⤵
          PID:1332
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create pqbsekoh binPath= "C:\Windows\SysWOW64\pqbsekoh\uthjxuvn.exe /d\"C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2644
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description pqbsekoh "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2380
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start pqbsekoh
          2⤵
          • Launches sc.exe
          PID:2532
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2304
      • C:\Windows\SysWOW64\pqbsekoh\uthjxuvn.exe
        C:\Windows\SysWOW64\pqbsekoh\uthjxuvn.exe /d"C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2376

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\uthjxuvn.exe

        Filesize

        14.6MB

        MD5

        04bf8cc2665566312c9d1d4449c68a5f

        SHA1

        4ebf64be135033e0d82f76e73cab717b9514d6b7

        SHA256

        4d45713f8242d533027fdb1c79f0587a588a356745f4064714121a12a09105be

        SHA512

        60596905b44f73a85957c6a5ad5b7be5de33728a48ff3a4c4ff0d97f4b45a98a902c78ff9a4ed668f533201522ecebe74bfd81b477feccc758e5f94e41fee13a

      • memory/2040-1-0x00000000052F0000-0x00000000053F0000-memory.dmp

        Filesize

        1024KB

      • memory/2040-2-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2040-6-0x0000000000400000-0x0000000005169000-memory.dmp

        Filesize

        77.4MB

      • memory/2376-12-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2376-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2376-9-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2376-17-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2376-18-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2376-19-0x0000000000080000-0x0000000000095000-memory.dmp

        Filesize

        84KB

      • memory/2548-8-0x0000000005300000-0x0000000005400000-memory.dmp

        Filesize

        1024KB

      • memory/2548-13-0x0000000000400000-0x0000000005169000-memory.dmp

        Filesize

        77.4MB