Analysis

  • max time kernel
    94s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 22:40

General

  • Target

    297562b2a02789dd03deb8207e9c637f_JaffaCakes118.exe

  • Size

    99KB

  • MD5

    297562b2a02789dd03deb8207e9c637f

  • SHA1

    3e8df0c99673b561cb8422111587a628af006dd3

  • SHA256

    207acfca1de1938e54d115382a281816e4c0144001010f677234f34c56f67d0e

  • SHA512

    183c7a25187aa18e6348657e76d5a76f89ed359a61e86a0fc0fa1deb2b27874b35c35db61fa32aca642eeee367d4a8f180175607b4f552502e9fdcef5e9a194e

  • SSDEEP

    1536:sVYd3yhx2UZ22bwA6CP1kqHbDP5XPg4EpweDXIMEQd03rdPxsu4a:sVCH46Ekq7j5XPg490If355Ma

Malware Config

Extracted

Family

tofsee

C2

64.20.54.234

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\297562b2a02789dd03deb8207e9c637f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\297562b2a02789dd03deb8207e9c637f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\297562b2a02789dd03deb8207e9c637f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\297562b2a02789dd03deb8207e9c637f_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Users\Admin\aduy.exe
        "C:\Users\Admin\aduy.exe" /r
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\aduy.exe
          "C:\Users\Admin\aduy.exe" /r
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3212
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:2420
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 320
                6⤵
                • Program crash
                PID:3468
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6815.bat" "
          3⤵
            PID:4780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2420 -ip 2420
        1⤵
          PID:1584

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6815.bat

          Filesize

          117B

          MD5

          9a403efb1cd6a0a4e735121126280e20

          SHA1

          89267f37a9f81e602b5d483b007a5ba0ef0d48c5

          SHA256

          1002136b1a92b7f6732c5355f7d884e1d46ab373844134286787ce37874c3d15

          SHA512

          87caf552aceb7562fc36dce1d85e33bb183a1a7b850c6f675519955160326329f07af60dae901953daf852ebb35692076f35af1cc2fbbc82e1cbb12d8cd562e9

        • C:\Users\Admin\aduy.exe

          Filesize

          99KB

          MD5

          297562b2a02789dd03deb8207e9c637f

          SHA1

          3e8df0c99673b561cb8422111587a628af006dd3

          SHA256

          207acfca1de1938e54d115382a281816e4c0144001010f677234f34c56f67d0e

          SHA512

          183c7a25187aa18e6348657e76d5a76f89ed359a61e86a0fc0fa1deb2b27874b35c35db61fa32aca642eeee367d4a8f180175607b4f552502e9fdcef5e9a194e

        • memory/2320-0-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2320-2-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2320-4-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2320-25-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2420-21-0x0000000000810000-0x0000000000820000-memory.dmp

          Filesize

          64KB

        • memory/2420-14-0x0000000000810000-0x0000000000820000-memory.dmp

          Filesize

          64KB

        • memory/2420-29-0x0000000000810000-0x0000000000820000-memory.dmp

          Filesize

          64KB

        • memory/2420-30-0x00000000009C0000-0x00000000009C1000-memory.dmp

          Filesize

          4KB

        • memory/2420-31-0x0000000000810000-0x0000000000820000-memory.dmp

          Filesize

          64KB

        • memory/2420-32-0x0000000000810000-0x0000000000820000-memory.dmp

          Filesize

          64KB

        • memory/3212-13-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB