Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 05:06

General

  • Target

    f75321be65ccd1fb27f978e8ec360738_JaffaCakes118.exe

  • Size

    14.7MB

  • MD5

    f75321be65ccd1fb27f978e8ec360738

  • SHA1

    60cefa28535cc8f77cc1b8e6aaf03ba6762f5e38

  • SHA256

    d9cc026783b0511da70d785bbd3093e11bb0927115bc7409d25b1c9ae3d1e7e1

  • SHA512

    81e650c4e50195dadec6f1bde08c4296cf1938fbe7563bd5598f824558e047dcc0030c0e9d99ec89ea41c4905c309254e8717c4e910470afd4d95a7bd6e5ff22

  • SSDEEP

    12288:GRXQK44fy611111111111111111111111111111111111111111111111111111H:GRx2

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 21 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f75321be65ccd1fb27f978e8ec360738_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f75321be65ccd1fb27f978e8ec360738_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 588
      2⤵
      • Program crash
      PID:3596
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 828
      2⤵
      • Program crash
      PID:1340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 836
      2⤵
      • Program crash
      PID:1140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 960
      2⤵
      • Program crash
      PID:4640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 992
      2⤵
      • Program crash
      PID:4208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1000
      2⤵
      • Program crash
      PID:2592
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1008
      2⤵
      • Program crash
      PID:4484
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wvaacnfv\
      2⤵
        PID:3360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 908
        2⤵
        • Program crash
        PID:2784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 604
        2⤵
        • Program crash
        PID:4248
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dlaerpyy.exe" C:\Windows\SysWOW64\wvaacnfv\
        2⤵
          PID:208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 772
          2⤵
          • Program crash
          PID:4864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 904
          2⤵
          • Program crash
          PID:1804
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create wvaacnfv binPath= "C:\Windows\SysWOW64\wvaacnfv\dlaerpyy.exe /d\"C:\Users\Admin\AppData\Local\Temp\f75321be65ccd1fb27f978e8ec360738_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:4076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 784
          2⤵
          • Program crash
          PID:2200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 676
          2⤵
          • Program crash
          PID:3720
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description wvaacnfv "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 640
          2⤵
          • Program crash
          PID:4384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1108
          2⤵
          • Program crash
          PID:2880
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start wvaacnfv
          2⤵
          • Launches sc.exe
          PID:3508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1216
          2⤵
          • Program crash
          PID:2596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 792
          2⤵
          • Program crash
          PID:1264
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:4400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1168
          2⤵
          • Program crash
          PID:2120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1980 -ip 1980
        1⤵
          PID:3652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1980 -ip 1980
          1⤵
            PID:972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1980 -ip 1980
            1⤵
              PID:4424
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1980 -ip 1980
              1⤵
                PID:228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1980 -ip 1980
                1⤵
                  PID:4804
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1980 -ip 1980
                  1⤵
                    PID:1584
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 1980
                    1⤵
                      PID:3448
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1980 -ip 1980
                      1⤵
                        PID:1268
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 1980
                        1⤵
                          PID:548
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1980 -ip 1980
                          1⤵
                            PID:2776
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 1980
                            1⤵
                              PID:5052
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1980 -ip 1980
                              1⤵
                                PID:4988
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 1980
                                1⤵
                                  PID:1452
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1980 -ip 1980
                                  1⤵
                                    PID:3956
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1980 -ip 1980
                                    1⤵
                                      PID:4344
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1980 -ip 1980
                                      1⤵
                                        PID:3544
                                      • C:\Windows\SysWOW64\wvaacnfv\dlaerpyy.exe
                                        C:\Windows\SysWOW64\wvaacnfv\dlaerpyy.exe /d"C:\Users\Admin\AppData\Local\Temp\f75321be65ccd1fb27f978e8ec360738_JaffaCakes118.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of WriteProcessMemory
                                        PID:3008
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 252
                                          2⤵
                                          • Program crash
                                          PID:3716
                                        • C:\Windows\SysWOW64\svchost.exe
                                          svchost.exe
                                          2⤵
                                          • Sets service image path in registry
                                          • Deletes itself
                                          PID:1648
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 532
                                          2⤵
                                          • Program crash
                                          PID:1252
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 552
                                          2⤵
                                          • Program crash
                                          PID:2012
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1980 -ip 1980
                                        1⤵
                                          PID:2112
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1980 -ip 1980
                                          1⤵
                                            PID:1072
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3008 -ip 3008
                                            1⤵
                                              PID:3224
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3008 -ip 3008
                                              1⤵
                                                PID:1520
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3008 -ip 3008
                                                1⤵
                                                  PID:1768

                                                Network

                                                MITRE ATT&CK Matrix ATT&CK v13

                                                Persistence

                                                Create or Modify System Process

                                                2
                                                T1543

                                                Windows Service

                                                2
                                                T1543.003

                                                Boot or Logon Autostart Execution

                                                1
                                                T1547

                                                Registry Run Keys / Startup Folder

                                                1
                                                T1547.001

                                                Privilege Escalation

                                                Create or Modify System Process

                                                2
                                                T1543

                                                Windows Service

                                                2
                                                T1543.003

                                                Boot or Logon Autostart Execution

                                                1
                                                T1547

                                                Registry Run Keys / Startup Folder

                                                1
                                                T1547.001

                                                Defense Evasion

                                                Impair Defenses

                                                1
                                                T1562

                                                Disable or Modify System Firewall

                                                1
                                                T1562.004

                                                Modify Registry

                                                1
                                                T1112

                                                Discovery

                                                Query Registry

                                                1
                                                T1012

                                                System Information Discovery

                                                2
                                                T1082

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\dlaerpyy.exe
                                                  Filesize

                                                  12.9MB

                                                  MD5

                                                  e0477701ae4751fccdaf80671baec763

                                                  SHA1

                                                  c55e8b77e1eba4d48e09f02dc36c83e683dce5a1

                                                  SHA256

                                                  6a1909a333d49dccc8145ee5762c911ec7795b959372a49136d6cd918aebe7d3

                                                  SHA512

                                                  30bf39736f325c8df0ef2d6c87f9fe651a0ac77ee7716b65e76cb7c7d070244e4c93b4083aea898e488e3b4f91d93e48df11d968b1764ad29d200fe2175a97e6

                                                • memory/1648-16-0x0000000000EE0000-0x0000000000EF5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1648-12-0x0000000000EE0000-0x0000000000EF5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1648-17-0x0000000000EE0000-0x0000000000EF5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1648-19-0x0000000000EE0000-0x0000000000EF5000-memory.dmp
                                                  Filesize

                                                  84KB

                                                • memory/1980-4-0x0000000000400000-0x0000000003359000-memory.dmp
                                                  Filesize

                                                  47.3MB

                                                • memory/1980-2-0x00000000001C0000-0x00000000001D3000-memory.dmp
                                                  Filesize

                                                  76KB

                                                • memory/1980-7-0x0000000000400000-0x0000000003359000-memory.dmp
                                                  Filesize

                                                  47.3MB

                                                • memory/1980-8-0x00000000001C0000-0x00000000001D3000-memory.dmp
                                                  Filesize

                                                  76KB

                                                • memory/1980-1-0x00000000035F0000-0x00000000036F0000-memory.dmp
                                                  Filesize

                                                  1024KB

                                                • memory/3008-10-0x0000000000400000-0x0000000003359000-memory.dmp
                                                  Filesize

                                                  47.3MB

                                                • memory/3008-11-0x00000000034D0000-0x00000000035D0000-memory.dmp
                                                  Filesize

                                                  1024KB

                                                • memory/3008-18-0x0000000000400000-0x0000000003359000-memory.dmp
                                                  Filesize

                                                  47.3MB