Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
003ebc02979788d54503d677624b9573_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
003ebc02979788d54503d677624b9573_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
003ebc02979788d54503d677624b9573_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
003ebc02979788d54503d677624b9573
-
SHA1
e1c8371cb1528b3349edfd56b41cdc0b25789aa1
-
SHA256
328ce7e6262695a3fccbd1e1faf5ef0a119bf58eb7263ca4f3c1ac6a747aa5b6
-
SHA512
e6e4581454c9dbc595c9fb489b0d5972dca0d71e8bafd188d19127baa8348c9a82f97e8388c2b3485a09739c19d3fe1653185cc0d0423117ba72887e01eb641b
-
SSDEEP
49152:4XkFaYyNnAkRnBLR3CzyHiUQrGlVWNApdgmL2z1MBLzqy4H5t6Jkg7Iy3:xUT5AkRBLR3g2iUQrK8OjzLyhyYamK
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
tolmkat.exedescription ioc process File opened for modification C:\Windows\system32\drivers\tolmkat.dat tolmkat.exe File created C:\Windows\system32\drivers\tolmkat.dat tolmkat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
003ebc02979788d54503d677624b9573_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation 003ebc02979788d54503d677624b9573_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
tolmkat.exepid process 1628 tolmkat.exe -
Loads dropped DLL 1 IoCs
Processes:
tolmkat.exepid process 1628 tolmkat.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkat64.dat vmprotect -
Drops file in System32 directory 2 IoCs
Processes:
tolmkat.exedescription ioc process File opened for modification C:\Windows\system32\tolmkit.dll tolmkat.exe File created C:\Windows\system32\tolmkit.dll tolmkat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tolmkat.exepid process 1628 tolmkat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
003ebc02979788d54503d677624b9573_JaffaCakes118.exedescription pid process target process PID 4804 wrote to memory of 1628 4804 003ebc02979788d54503d677624b9573_JaffaCakes118.exe tolmkat.exe PID 4804 wrote to memory of 1628 4804 003ebc02979788d54503d677624b9573_JaffaCakes118.exe tolmkat.exe PID 4804 wrote to memory of 1628 4804 003ebc02979788d54503d677624b9573_JaffaCakes118.exe tolmkat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\003ebc02979788d54503d677624b9573_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\003ebc02979788d54503d677624b9573_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkat.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkat.exe" /unionid 120012⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkat.exeFilesize
43KB
MD5e0288aecf2a061999489fa4644d5a9c0
SHA1e05ae14b6724da389927fd0a764a18afef38ce8e
SHA256c2f12ce607a029ffd56b4c66c74b7a65d8bd7528bb6a14d19970c508492dcbda
SHA5126e7fcbaff7ade86a23d2d81c883904a3e5e919345286704f872d88aabaed70722f98d1642fe8a7c1ac6d0da07a4b074b6ba192878bfe1238f6daca989f0a3523
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkat64.datFilesize
946KB
MD5c1d4bbba4b1bf363aef1cdeb1c6008f4
SHA1c3d8b933f012f63e51c3c5bf03386dcc2d1448dc
SHA256e274d03846011555b396e14978c88306a07d222a12334b25106a095d5674e787
SHA512b3b8bcee4e3d097e9adb77f076cf9e9b3dcb0d221ea1ba12fc597704228491278d3eada48ba0b3d99aa21e97df90046f538f0c66363975aaeb00161c67211541
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkit.dllFilesize
986KB
MD55a61dab6c238733a85785b14a763c5aa
SHA10093a016f0ba8f966adedad231cfc8adaaf28eea
SHA2562701ef3d23fb698d68241460f276621d859c95ed29d164370e7513d18df92c3c
SHA5128a5c60d992e171a5a52a4fae1edea064cd7549e18c47fd0c5bdcb85a31d1a9f03c5884fa02cafc38a603fc62f6df0b303bf1d085038aaa3915a9fe140f82c08f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\tolmkit64.dllFilesize
997KB
MD546e9ce826393ceff27bc3b0d35ef15ef
SHA1c7c354e1af0095fa15ac72d0a00fd8a5482d0c43
SHA256e05e6b802af4cf5b598012f76c79a95d5577c6780ee4783d941fe1259f0b603a
SHA5127eab26f850410328d5f1055a3fe4436d8c72f8da844f82a5cd5f6c48dd865c83cdb1e484744be4f4b8ade7c924ed67a7ea6922c000f613ec0998441262d84208