Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe
-
Size
279KB
-
MD5
aca6ce478caeff079e8c9d1bbb063aed
-
SHA1
d36e184d120f71b3c430c4709a64395921ab2e46
-
SHA256
1bf28e028ac03bf57bea8030dcecf8275bb84619348fb6b6fe834e8b8fe8113b
-
SHA512
291ad5da14c0c1d4f5c96d8c3b5e909a992d7c532df948e8d8a816287a1fa1b9a0f5043cebd082ce2c60939ec8c931753141300bb5eefc88d24730442e0a2f21
-
SSDEEP
3072:VWWX+oGUd1Qcn50hOK0Ypc+tSVipzFIgBi/tNL2AMmbvlmMyoOPiW5ewkkT4rbo4:4XO1QuuO4plh7BwtojqlQDLT8wS
Malware Config
Extracted
tofsee
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 hhqpbnac.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\hhqpbnac.exe\"" aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum hhqpbnac.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 hhqpbnac.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2364 2804 hhqpbnac.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhqpbnac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2804 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2804 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2804 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2804 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2676 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2676 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2676 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2676 2736 aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33 PID 2804 wrote to memory of 2364 2804 hhqpbnac.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aca6ce478caeff079e8c9d1bbb063aed_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\hhqpbnac.exe"C:\Users\Admin\hhqpbnac.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1232.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD50e66be296f6c282f2c1d9439c1e47ffb
SHA1c1ca9835c0b5e62df77e118f3fd32fcf767966e3
SHA256fe41b5591b14a899e3892c1713f2df23b6027fdf65e2d700b247c2880a461f3f
SHA512d7cfff62267f23ed176f67cf04a8cac1c7eae69725123058f1edc17b8c5ead05c96a5ca14f1f235bf66676f55b51753eea34bb95e2fb8af509a81caf3a2f7b8b
-
Filesize
279KB
MD5aca6ce478caeff079e8c9d1bbb063aed
SHA1d36e184d120f71b3c430c4709a64395921ab2e46
SHA2561bf28e028ac03bf57bea8030dcecf8275bb84619348fb6b6fe834e8b8fe8113b
SHA512291ad5da14c0c1d4f5c96d8c3b5e909a992d7c532df948e8d8a816287a1fa1b9a0f5043cebd082ce2c60939ec8c931753141300bb5eefc88d24730442e0a2f21