Analysis

  • max time kernel
    159s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 08:50

General

  • Target

    fee7407aceb4cdb6521f6729e4e819c3_JaffaCakes118.exe

  • Size

    10.3MB

  • MD5

    fee7407aceb4cdb6521f6729e4e819c3

  • SHA1

    c3b6fa6d67cf29c1ba69938658b6e1f6bd6169ce

  • SHA256

    58aa25180cf5775c92f460b11fcecd58f5bc03ebd03848b1e025c09864158b1c

  • SHA512

    e6f0bb159d4f42c68229a9794cdfdcfbb2c8835d63495b4766b5fc757525cdcbe4052300e89fa7ada68212b5e1e84e0dfed71655cdf972a9bf71cb659807a8da

  • SSDEEP

    24576:XjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee+:X/D

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fee7407aceb4cdb6521f6729e4e819c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fee7407aceb4cdb6521f6729e4e819c3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\arkpesgz\
      2⤵
        PID:3772
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\veqwgbxn.exe" C:\Windows\SysWOW64\arkpesgz\
        2⤵
          PID:2312
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create arkpesgz binPath= "C:\Windows\SysWOW64\arkpesgz\veqwgbxn.exe /d\"C:\Users\Admin\AppData\Local\Temp\fee7407aceb4cdb6521f6729e4e819c3_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:1488
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description arkpesgz "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:4288
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start arkpesgz
          2⤵
          • Launches sc.exe
          PID:3732
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:1504
      • C:\Windows\SysWOW64\arkpesgz\veqwgbxn.exe
        C:\Windows\SysWOW64\arkpesgz\veqwgbxn.exe /d"C:\Users\Admin\AppData\Local\Temp\fee7407aceb4cdb6521f6729e4e819c3_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Sets service image path in registry
          PID:1600
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:936

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\veqwgbxn.exe

          Filesize

          10.8MB

          MD5

          2ad2142f2f8462447fc4a9054c944784

          SHA1

          fa805f828d94bbeca24cd8413e4c96e5a41d96f0

          SHA256

          4267034796fb7b1d1c002b0d6ae294ff6fccf6f797c86c07fdc986374fdf4fa0

          SHA512

          416e6fd30480722045d3d9e9069ea7fddd32db7a306daabfaa4acc5cf3b05ea1e922e8bc86a08575bd0d3df6b5c00272f2b8241fcbf7b054cf0268707d436b00

        • memory/1600-14-0x00000000012E0000-0x00000000012F5000-memory.dmp

          Filesize

          84KB

        • memory/1600-11-0x00000000012E0000-0x00000000012F5000-memory.dmp

          Filesize

          84KB

        • memory/1600-27-0x00000000012E0000-0x00000000012F5000-memory.dmp

          Filesize

          84KB

        • memory/1600-19-0x00000000012E0000-0x00000000012F5000-memory.dmp

          Filesize

          84KB

        • memory/1600-18-0x00000000012E0000-0x00000000012F5000-memory.dmp

          Filesize

          84KB

        • memory/2144-17-0x00000000005A0000-0x00000000006A0000-memory.dmp

          Filesize

          1024KB

        • memory/2144-3-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/2144-15-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/2144-1-0x00000000005A0000-0x00000000006A0000-memory.dmp

          Filesize

          1024KB

        • memory/2144-2-0x0000000002080000-0x0000000002093000-memory.dmp

          Filesize

          76KB

        • memory/2144-21-0x0000000002080000-0x0000000002093000-memory.dmp

          Filesize

          76KB

        • memory/2144-5-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/4676-10-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/4676-16-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/4676-9-0x0000000000620000-0x0000000000720000-memory.dmp

          Filesize

          1024KB