Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
-
Size
110KB
-
MD5
a3c194b99325a6f9c69c4000d6bbd63d
-
SHA1
06cbdd6ce8b759f5cc2bca41ef8afdf9130c9116
-
SHA256
b156f43683084b18e719dc72bdc0daead155fb3502eaeca19ed39f51bd8d00c4
-
SHA512
08612b95baa0eb7ab2e18c071856bd77fa8f93e7b92a72c0097d5d6fbaa39326a4917a663d7d771640ff29b2b247b3512df96fd868223ff87427323da7b89905
-
SSDEEP
1536:uwGVxjjSw7LhpTkVC7Jw5PfN68Dl6tp8BLFRfcvsNlJc35C:zeVpmC7Jw5w8DM8pFSglJ2C
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 rxrrdhc.exe 2800 rxrrdhc.exe -
Loads dropped DLL 3 IoCs
pid Process 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 2348 rxrrdhc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\rxrrdhc.exe\" /r" a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2116 set thread context of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2348 set thread context of 2800 2348 rxrrdhc.exe 34 PID 2800 set thread context of 2700 2800 rxrrdhc.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrrdhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrrdhc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2112 2116 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2348 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2348 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2348 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2348 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2808 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2808 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2808 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2808 2112 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2348 wrote to memory of 2800 2348 rxrrdhc.exe 34 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35 PID 2800 wrote to memory of 2700 2800 rxrrdhc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\rxrrdhc.exe"C:\Users\Admin\rxrrdhc.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\rxrrdhc.exe"C:\Users\Admin\rxrrdhc.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2458.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5419bc6e4fc3c4bc8f6f5b8ed6857dfb6
SHA1f07461fe2a4b843c93245342f5c1e5fcc1aa033a
SHA256d9842bbd560b0ffdd65f9282b635ab49ee3bbdfd9edbf1c4b0795ba64a28cca8
SHA512cf980253957ca3dc62f811a3c50728e30bf23b34c8470dba4ba946e69adcac4555ccda1e3b8b8b17dbc852069d38bdda56b2f574682f8c05bd033ac618c83318
-
Filesize
110KB
MD5a3c194b99325a6f9c69c4000d6bbd63d
SHA106cbdd6ce8b759f5cc2bca41ef8afdf9130c9116
SHA256b156f43683084b18e719dc72bdc0daead155fb3502eaeca19ed39f51bd8d00c4
SHA51208612b95baa0eb7ab2e18c071856bd77fa8f93e7b92a72c0097d5d6fbaa39326a4917a663d7d771640ff29b2b247b3512df96fd868223ff87427323da7b89905