Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 15:05

General

  • Target

    f3bd0e796e1c1b59bde69cecbde26000_JaffaCakes118.exe

  • Size

    14.3MB

  • MD5

    f3bd0e796e1c1b59bde69cecbde26000

  • SHA1

    a3d3bd7e6d987e6cf93c97d80d86b68d2be90af8

  • SHA256

    0debd985cd0fff7744ed3165078a38bcb30b0b064ddb5b006d84f2751e0d50f9

  • SHA512

    32a1ffa73aad3303d3de5bd8766c73d8367c6e1476218df2bd801c2729e34fdacd730e34d6dc5d734d50137cc0db5e8ad0b171d63a3120d4a1b22dccd5193fb3

  • SSDEEP

    3072:DlIKxNiT/X910MzPvrmJXOWYL1DyHSHbfTYBDsopr7p85KzqyROF5LevXZUmoBZ2:DlIKziTP910Uwq1uH4gBDs8BgRn2x

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3bd0e796e1c1b59bde69cecbde26000_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3bd0e796e1c1b59bde69cecbde26000_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\eluchmfd\
      2⤵
        PID:1560
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xpygdqcw.exe" C:\Windows\SysWOW64\eluchmfd\
        2⤵
          PID:2564
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create eluchmfd binPath= "C:\Windows\SysWOW64\eluchmfd\xpygdqcw.exe /d\"C:\Users\Admin\AppData\Local\Temp\f3bd0e796e1c1b59bde69cecbde26000_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:2648
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description eluchmfd "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2736
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start eluchmfd
          2⤵
          • Launches sc.exe
          PID:2724
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:2620
      • C:\Windows\SysWOW64\eluchmfd\xpygdqcw.exe
        C:\Windows\SysWOW64\eluchmfd\xpygdqcw.exe /d"C:\Users\Admin\AppData\Local\Temp\f3bd0e796e1c1b59bde69cecbde26000_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\xpygdqcw.exe

        Filesize

        10.2MB

        MD5

        0fd6a55063996e1fe4d8c19371b87047

        SHA1

        fc442bee98df9d3b1df83ca417a9c715a9d6ac55

        SHA256

        b7282f25a5e318a80a06fa63d81b8f5d681f4ffaaa86f8b27a712d7d92a50281

        SHA512

        05813d404fce85d1fe8ab7375196923d9ff66efad3b8df2028ac6489996af3f56d3b88aacd377e677064883f0b002cc0aa65ab9647013837e0c3ae99c3645d0c

      • memory/2540-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2540-22-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2540-21-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2540-19-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2540-20-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2540-15-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2540-10-0x0000000000110000-0x0000000000125000-memory.dmp

        Filesize

        84KB

      • memory/2948-13-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2948-11-0x0000000000630000-0x0000000000730000-memory.dmp

        Filesize

        1024KB

      • memory/2948-16-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2968-1-0x00000000004F0000-0x00000000005F0000-memory.dmp

        Filesize

        1024KB

      • memory/2968-9-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB

      • memory/2968-8-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2968-3-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2968-2-0x0000000000220000-0x0000000000233000-memory.dmp

        Filesize

        76KB