Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe
-
Size
110KB
-
MD5
a3c194b99325a6f9c69c4000d6bbd63d
-
SHA1
06cbdd6ce8b759f5cc2bca41ef8afdf9130c9116
-
SHA256
b156f43683084b18e719dc72bdc0daead155fb3502eaeca19ed39f51bd8d00c4
-
SHA512
08612b95baa0eb7ab2e18c071856bd77fa8f93e7b92a72c0097d5d6fbaa39326a4917a663d7d771640ff29b2b247b3512df96fd868223ff87427323da7b89905
-
SSDEEP
1536:uwGVxjjSw7LhpTkVC7Jw5PfN68Dl6tp8BLFRfcvsNlJc35C:zeVpmC7Jw5w8DM8pFSglJ2C
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1472 radla.exe 4600 radla.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\radla.exe\" /r" a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5044 set thread context of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 1472 set thread context of 4600 1472 radla.exe 84 PID 4600 set thread context of 2732 4600 radla.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2096 2732 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language radla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language radla.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 5044 wrote to memory of 2020 5044 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 82 PID 2020 wrote to memory of 1472 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 83 PID 2020 wrote to memory of 1472 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 83 PID 2020 wrote to memory of 1472 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 83 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 1472 wrote to memory of 4600 1472 radla.exe 84 PID 4600 wrote to memory of 2732 4600 radla.exe 85 PID 4600 wrote to memory of 2732 4600 radla.exe 85 PID 4600 wrote to memory of 2732 4600 radla.exe 85 PID 4600 wrote to memory of 2732 4600 radla.exe 85 PID 4600 wrote to memory of 2732 4600 radla.exe 85 PID 2020 wrote to memory of 2692 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 89 PID 2020 wrote to memory of 2692 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 89 PID 2020 wrote to memory of 2692 2020 a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3c194b99325a6f9c69c4000d6bbd63d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\radla.exe"C:\Users\Admin\radla.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\radla.exe"C:\Users\Admin\radla.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3246⤵
- Program crash
PID:2096
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8838.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2732 -ip 27321⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5419bc6e4fc3c4bc8f6f5b8ed6857dfb6
SHA1f07461fe2a4b843c93245342f5c1e5fcc1aa033a
SHA256d9842bbd560b0ffdd65f9282b635ab49ee3bbdfd9edbf1c4b0795ba64a28cca8
SHA512cf980253957ca3dc62f811a3c50728e30bf23b34c8470dba4ba946e69adcac4555ccda1e3b8b8b17dbc852069d38bdda56b2f574682f8c05bd033ac618c83318
-
Filesize
110KB
MD5a3c194b99325a6f9c69c4000d6bbd63d
SHA106cbdd6ce8b759f5cc2bca41ef8afdf9130c9116
SHA256b156f43683084b18e719dc72bdc0daead155fb3502eaeca19ed39f51bd8d00c4
SHA51208612b95baa0eb7ab2e18c071856bd77fa8f93e7b92a72c0097d5d6fbaa39326a4917a663d7d771640ff29b2b247b3512df96fd868223ff87427323da7b89905