Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 06:37

General

  • Target

    f777ab88e7988a6197689c84bd5c200b_JaffaCakes118.exe

  • Size

    10.1MB

  • MD5

    f777ab88e7988a6197689c84bd5c200b

  • SHA1

    9b8f94fe18fcfcbbb6ca1736751d6ca5ee417766

  • SHA256

    cc405e27cf3c45f22534764ed6c2c3d7dc46264b4c275cfc53b3cf6707c211a5

  • SHA512

    9e9730d5ee6629003f29dcd9193ccd09acfa52256439a8408019273fd12b5c87138de4459d659c63a7eb505cc81039a50767ca33adf687a389a40aeb6ba64436

  • SSDEEP

    12288:Iz+wSUpBMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMs:Iz8

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f777ab88e7988a6197689c84bd5c200b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f777ab88e7988a6197689c84bd5c200b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yfldoquq\
      2⤵
        PID:2128
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vewvequl.exe" C:\Windows\SysWOW64\yfldoquq\
        2⤵
          PID:4560
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create yfldoquq binPath= "C:\Windows\SysWOW64\yfldoquq\vewvequl.exe /d\"C:\Users\Admin\AppData\Local\Temp\f777ab88e7988a6197689c84bd5c200b_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1812
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description yfldoquq "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4768
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start yfldoquq
          2⤵
          • Launches sc.exe
          PID:4896
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3996
      • C:\Windows\SysWOW64\yfldoquq\vewvequl.exe
        C:\Windows\SysWOW64\yfldoquq\vewvequl.exe /d"C:\Users\Admin\AppData\Local\Temp\f777ab88e7988a6197689c84bd5c200b_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4924
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          • Deletes itself
          PID:3992

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Impair Defenses

      1
      T1562

      Disable or Modify System Firewall

      1
      T1562.004

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\vewvequl.exe
        Filesize

        14.9MB

        MD5

        86ccea191b283ba1923980c40b24e3d8

        SHA1

        9515dc33eab7c7c95c0310b6d692dc4726ce3eb8

        SHA256

        174c1117161ed764af6666350fdcea90f0eaa6a381387192a3d8a992d9babf2b

        SHA512

        e84b9b033ba1fc1a5e686f62f4dda0140f9c6d460ebe287082feea120aaca916cd82a85676524f01c7f9d31e37185bbecf48886c206ba7e8db30d3d8c5e4cb65

      • memory/3992-11-0x0000000000E20000-0x0000000000E35000-memory.dmp
        Filesize

        84KB

      • memory/3992-18-0x0000000000E20000-0x0000000000E35000-memory.dmp
        Filesize

        84KB

      • memory/3992-17-0x0000000000E20000-0x0000000000E35000-memory.dmp
        Filesize

        84KB

      • memory/3992-16-0x0000000000E20000-0x0000000000E35000-memory.dmp
        Filesize

        84KB

      • memory/4808-3-0x00000000005E0000-0x00000000005E1000-memory.dmp
        Filesize

        4KB

      • memory/4808-7-0x000000005F000000-0x000000005F011000-memory.dmp
        Filesize

        68KB

      • memory/4808-6-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/4808-0-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/4808-1-0x00000000005D0000-0x00000000005D1000-memory.dmp
        Filesize

        4KB

      • memory/4808-2-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/4924-9-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/4924-10-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB

      • memory/4924-12-0x0000000000400000-0x000000000041E000-memory.dmp
        Filesize

        120KB