Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe
-
Size
144KB
-
MD5
79e36707abf82183a03e9d8dda3b3430
-
SHA1
d986b8ba3ed36333f127b34842fc991713c4f5ac
-
SHA256
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790f
-
SHA512
26f0b48f09193014bd9fc5f1ede8df23979e4791ae47e6d4395656fa62d22a32435f43aba15e3f32facb4fdc24f2ed97305bebf1eb53bc5033bae82710e88b4d
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGqSV3:uaGoEpWxSbGqSV3
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
pqiggasf.exepid process 2460 pqiggasf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\pqiggasf.exe\"" 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pqiggasf.exedescription pid process target process PID 2460 set thread context of 1804 2460 pqiggasf.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 396 1804 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pqiggasf.execmd.exesvchost.exe79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pqiggasf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exepqiggasf.exedescription pid process target process PID 764 wrote to memory of 2460 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe pqiggasf.exe PID 764 wrote to memory of 2460 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe pqiggasf.exe PID 764 wrote to memory of 2460 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe pqiggasf.exe PID 2460 wrote to memory of 1804 2460 pqiggasf.exe svchost.exe PID 2460 wrote to memory of 1804 2460 pqiggasf.exe svchost.exe PID 2460 wrote to memory of 1804 2460 pqiggasf.exe svchost.exe PID 2460 wrote to memory of 1804 2460 pqiggasf.exe svchost.exe PID 2460 wrote to memory of 1804 2460 pqiggasf.exe svchost.exe PID 764 wrote to memory of 60 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe PID 764 wrote to memory of 60 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe PID 764 wrote to memory of 60 764 79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79e36707abf82183a03e9d8dda3b3430_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\pqiggasf.exe"C:\Users\Admin\pqiggasf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 3564⤵
- Program crash
PID:396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0426.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1804 -ip 18041⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD57d40b7fed97e870199748c47f2bd0746
SHA1ad8bbd529cfc739c130c518103dedd922bb29fb6
SHA2561f9fb5c88a94be036093bbd3bb2065bfb9400d8907700525c68b849658fd8777
SHA51288e4d08241f2ef2f7fa6279794347224934f6439c7eacff2fb753ca7504acf9a30e1c6eca662bd80b0054aee1420b41bf56b648277b4911be923b5faef95643b
-
Filesize
41.4MB
MD59dfa5a8b6dbdd701a861feff5a3eee49
SHA18dafd5c1ba24e2f81b256958336096da1b29655f
SHA256c92836a2eb5fa89da7dc601b386df8ece24e6f6ea2dfb45dd0232d2575b924b6
SHA512e3e9f3634557cb4c01fce6acb38a216beca5c07b65a5f116c1082c4c64ef102f06f84d9e98bc5ac55c2a31fdeff620c93a7af366fa5131df51113d66be3a7fc6