Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
-
Size
144KB
-
MD5
79e36707abf82183a03e9d8dda3b3430
-
SHA1
d986b8ba3ed36333f127b34842fc991713c4f5ac
-
SHA256
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790f
-
SHA512
26f0b48f09193014bd9fc5f1ede8df23979e4791ae47e6d4395656fa62d22a32435f43aba15e3f32facb4fdc24f2ed97305bebf1eb53bc5033bae82710e88b4d
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGqSV3:uaGoEpWxSbGqSV3
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2632 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
ijbzztly.exepid process 2880 ijbzztly.exe -
Loads dropped DLL 2 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exepid process 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ijbzztly.exe\"" 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ijbzztly.exedescription pid process target process PID 2880 set thread context of 2612 2880 ijbzztly.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exesvchost.exe79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exeijbzztly.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijbzztly.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exeijbzztly.exepid process 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe 2880 ijbzztly.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exeijbzztly.exedescription pid process target process PID 2824 wrote to memory of 2880 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe ijbzztly.exe PID 2824 wrote to memory of 2880 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe ijbzztly.exe PID 2824 wrote to memory of 2880 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe ijbzztly.exe PID 2824 wrote to memory of 2880 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe ijbzztly.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2880 wrote to memory of 2612 2880 ijbzztly.exe svchost.exe PID 2824 wrote to memory of 2632 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe PID 2824 wrote to memory of 2632 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe PID 2824 wrote to memory of 2632 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe PID 2824 wrote to memory of 2632 2824 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\ijbzztly.exe"C:\Users\Admin\ijbzztly.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5076.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD57d40b7fed97e870199748c47f2bd0746
SHA1ad8bbd529cfc739c130c518103dedd922bb29fb6
SHA2561f9fb5c88a94be036093bbd3bb2065bfb9400d8907700525c68b849658fd8777
SHA51288e4d08241f2ef2f7fa6279794347224934f6439c7eacff2fb753ca7504acf9a30e1c6eca662bd80b0054aee1420b41bf56b648277b4911be923b5faef95643b
-
Filesize
49.1MB
MD5792897d0799f8225506ab72a0da0f7fb
SHA132f9f0b063534f6492b97f9dcc626c78e03ebf9a
SHA256c0bbf1ee4100d6e7f58781b65b95352f6d68aa228529267e4c33e73a31b40524
SHA51269919cbcc96b88bd9665bcda17e5377387105596a55d197fd9820111a17b3ae395c828cfcc0e4d9da2e5c361d84348947ddd71c5fc2848bc8c1fc6c8cdd425cd