Analysis

  • max time kernel
    142s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 11:30

General

  • Target

    214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe

  • Size

    106KB

  • MD5

    214ba52c1fe0615bdf8b110de5a54800

  • SHA1

    8d14c8471ad2ddea020c6283118c8031ce7f7194

  • SHA256

    4a98211c5559002c943be44e52f37e9362b06f3e384625735e2170ef215c7edc

  • SHA512

    d7f95da24b99e6e347cd64c508460f8b747cc110d3fef4667d59bd8894a97f72a4dab5b11b9f48649185f0248170b38b77ab5ae3d21da2d9665cbd347d763599

  • SSDEEP

    1536:pDfF/yYugpJ+BsxKlb0Tz7OOFGHWy4TmQsdLB8Hdez8VmF2jbxWGq6:pDf1y0pJTxKZUOOcICBU+QS2jbxWGq

Malware Config

Extracted

Family

tofsee

C2

91.218.38.211

188.130.237.71

185.25.48.10

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\214ba52c1fe0615bdf8b110de5a54800_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\fsxkpcvd.exe
      "C:\Users\Admin\fsxkpcvd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1104
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\1148.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1148.bat

    Filesize

    266B

    MD5

    631dba645b394f476070d8122c086310

    SHA1

    21e58377c08cd2426b2f60207f9db84ef4b90aa9

    SHA256

    775f1519414f738178a0c108ff7e944b4ee8192bd274ff7dc6ea415cce47aa0c

    SHA512

    7e3d4f59ff2e1b05ec0fb57661a2b3d30279e94dc5aa77e99915f7391224e85fccc3ddbd9e169d01c9422dbdb5eb81ba9fd82a85cba1070cb0ae5def994028c7

  • \Users\Admin\fsxkpcvd.exe

    Filesize

    35.5MB

    MD5

    126a5c2864743433b721999d57de2fa6

    SHA1

    b301bd6c8822bdc2dddde524d861668962a87417

    SHA256

    1586c6456b7e36489d405739204e50ca13660994a1feaa5aefe22f7cca0d4237

    SHA512

    5bbf7168caefd6bffc27a9be686e2083ce334b4aaea583c8a06b10c889e1c88837f420b6aeab5b266aa2950ab13541c27fa1ed20829550daa9cf5500065894ca

  • memory/692-15-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/692-13-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/692-22-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/692-14-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1104-41-0x00000000000C0000-0x00000000000D2000-memory.dmp

    Filesize

    72KB

  • memory/1104-30-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1104-26-0x00000000000C0000-0x00000000000D2000-memory.dmp

    Filesize

    72KB

  • memory/1104-25-0x00000000000C0000-0x00000000000D2000-memory.dmp

    Filesize

    72KB

  • memory/1104-43-0x00000000000C0000-0x00000000000D2000-memory.dmp

    Filesize

    72KB

  • memory/1104-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1104-16-0x00000000000C0000-0x00000000000D2000-memory.dmp

    Filesize

    72KB

  • memory/1292-6-0x0000000000280000-0x00000000002B2000-memory.dmp

    Filesize

    200KB

  • memory/1292-39-0x0000000000240000-0x0000000000252000-memory.dmp

    Filesize

    72KB

  • memory/1292-38-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1292-0-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1292-2-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1292-1-0x0000000000240000-0x0000000000252000-memory.dmp

    Filesize

    72KB