Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe
-
Size
184KB
-
MD5
86904bef92845b067a76d08ade4cc08b
-
SHA1
33ce7286d3a5f2cea3c5197e63fcbbc6effa026a
-
SHA256
0fe8469cbae130d45ae34e6c0a5c234928ad3776c4999ef03f065f960729408d
-
SHA512
7db74feff0246d8d5564cccbd23dcc555147881c7733f79c6013f9dcfae4f5f8d2fdde28722794665c73fdf85dd5f5d0a895fb9372dcc6fe0170b51cf1b293e2
-
SSDEEP
3072:r701YAYMLuPz7KhO0uZmmhi7hX0eZq5Y:s1FIL7j0cmE80eZ
Malware Config
Extracted
tofsee
103.232.222.57
111.121.193.242
123.249.0.22
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
glkneswx.exepid process 2572 glkneswx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\glkneswx.exe\"" 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
glkneswx.exedescription pid process target process PID 2572 set thread context of 2476 2572 glkneswx.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 112 2476 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exeglkneswx.execmd.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glkneswx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exeglkneswx.exepid process 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe 2572 glkneswx.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exeglkneswx.exedescription pid process target process PID 2284 wrote to memory of 2572 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe glkneswx.exe PID 2284 wrote to memory of 2572 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe glkneswx.exe PID 2284 wrote to memory of 2572 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe glkneswx.exe PID 2284 wrote to memory of 2248 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2248 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2248 2284 86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe cmd.exe PID 2572 wrote to memory of 2476 2572 glkneswx.exe svchost.exe PID 2572 wrote to memory of 2476 2572 glkneswx.exe svchost.exe PID 2572 wrote to memory of 2476 2572 glkneswx.exe svchost.exe PID 2572 wrote to memory of 2476 2572 glkneswx.exe svchost.exe PID 2572 wrote to memory of 2476 2572 glkneswx.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86904bef92845b067a76d08ade4cc08b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\glkneswx.exe"C:\Users\Admin\glkneswx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 4684⤵
- Program crash
PID:112
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2116.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2476 -ip 24761⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5767d045597bca45318ca1cc3d672c6a7
SHA1cd952a0dca79f0225e61c26f2cbe8d50a0cb5484
SHA2565d864c00dfd8f3c85d3453f13f40248ec32375310c665aa645ed200fcb1c5a02
SHA51263d2c560261ce00b7cab32e234f23a27446fe65bd989dbd4737c9d51924bffef5b90307f5d155995b8e3f288281799385599e966677372807b08cc4ed3b92140
-
Filesize
40.7MB
MD568fc9d9f3b7c5d8d39a117e253822161
SHA19eb3736e57476b6cc27948bdd3a5c063ad500b45
SHA25645b7a4e8fe4b85ce66ce9a75fa033f2ee43922591d4138da356442d1f94b93e7
SHA512d79d45e365642e7c970b2d970c7e18287d9f8307e78225b097bee00f7c03d96b32b985f3d50c2c222442674eb2d223e270c889f165185d4959fc7e2dd4cfd378