Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 12:03

General

  • Target

    ff3b549a7f1ab5e6afea72312c41f32b_JaffaCakes118.exe

  • Size

    14.1MB

  • MD5

    ff3b549a7f1ab5e6afea72312c41f32b

  • SHA1

    61268b3482f2580b105d7847be9c0a191c811eb5

  • SHA256

    7de98713dc8186de58d01dd68413711ab38d71cd2203610d0f2d77f05473d9d2

  • SHA512

    80fc2e375f09efd90fe0860d1476b3cb2e6679e19003692a74d8c32b6a125413f42ea169be5602dcd2d8c148da10eb722191c171e2bb40fd6df0a2237c845d99

  • SSDEEP

    98304:oYjPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP:o

Malware Config

Extracted

Family

tofsee

C2

43.231.4.6

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff3b549a7f1ab5e6afea72312c41f32b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff3b549a7f1ab5e6afea72312c41f32b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qiiprxuf\
      2⤵
        PID:1512
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jfxvdmph.exe" C:\Windows\SysWOW64\qiiprxuf\
        2⤵
          PID:2612
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create qiiprxuf binPath= "C:\Windows\SysWOW64\qiiprxuf\jfxvdmph.exe /d\"C:\Users\Admin\AppData\Local\Temp\ff3b549a7f1ab5e6afea72312c41f32b_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
          • Launches sc.exe
          PID:3020
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" description qiiprxuf "wifi internet conection"
          2⤵
          • Launches sc.exe
          PID:2636
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" start qiiprxuf
          2⤵
          • Launches sc.exe
          PID:2624
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
          2⤵
          • Modifies Windows Firewall
          PID:3016
      • C:\Windows\SysWOW64\qiiprxuf\jfxvdmph.exe
        C:\Windows\SysWOW64\qiiprxuf\jfxvdmph.exe /d"C:\Users\Admin\AppData\Local\Temp\ff3b549a7f1ab5e6afea72312c41f32b_JaffaCakes118.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          2⤵
          • Windows security bypass
          • Sets service image path in registry
          • Deletes itself
          PID:2536

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\jfxvdmph.exe

              Filesize

              14.4MB

              MD5

              b7f0cb7cf1be6940e5533362f099e68a

              SHA1

              a8291ae2797f9f0e4eb8cb7dbb26d35131460562

              SHA256

              8238bdde4be25ee2a4240cd1b6a019aa0c2f11beb964838e40321f1301298092

              SHA512

              2f5e7f74f6453f4bf7f8035476b57343d1b742536adeca6c7b135db3d21a67ea1302d8846e96df733b1c3d56d7856f3675b0f20e53a69f594ce4bd2ccd8d7fd4

            • memory/1196-1-0x0000000000C90000-0x0000000000D90000-memory.dmp

              Filesize

              1024KB

            • memory/1196-2-0x00000000002A0000-0x00000000002B3000-memory.dmp

              Filesize

              76KB

            • memory/1196-4-0x0000000000400000-0x0000000000C17000-memory.dmp

              Filesize

              8.1MB

            • memory/1196-7-0x0000000000400000-0x0000000000C17000-memory.dmp

              Filesize

              8.1MB

            • memory/1196-8-0x00000000002A0000-0x00000000002B3000-memory.dmp

              Filesize

              76KB

            • memory/2536-12-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2536-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2536-15-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2536-19-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2536-20-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2536-21-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2536-22-0x0000000000080000-0x0000000000095000-memory.dmp

              Filesize

              84KB

            • memory/2796-11-0x0000000000400000-0x0000000000C17000-memory.dmp

              Filesize

              8.1MB

            • memory/2796-10-0x0000000000CA0000-0x0000000000DA0000-memory.dmp

              Filesize

              1024KB

            • memory/2796-16-0x0000000000400000-0x0000000000C17000-memory.dmp

              Filesize

              8.1MB