Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe
-
Size
273KB
-
MD5
dfb88b02f63ed6cdab5e891ea96d0b33
-
SHA1
6fb1de517d54d48ac4e3b60256532c667be07b59
-
SHA256
69b07662024f000cf1fb480d083e4def873b45981f9c82d3230ce9a0265addc2
-
SHA512
608d8a9435c557ec4b2184104fff137b5f24180a0d61868f9ee8872fed1fde8c2741788b7761190e848764fa231d18c7fbd861f7dabd6e119513fa6401f3e922
-
SSDEEP
3072:ydC8qbyTR4lccnGEaORCLFWkA1uVi9XuP7+aCTUlW5BywfzEFFUyrhw4Xl:KgC4lcQ/luFcuc1ijHlsywfzgUyFw
Malware Config
Extracted
tofsee
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 goqi.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\goqi.exe\"" dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum goqi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 goqi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2604 2724 goqi.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2724 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 31 PID 1724 wrote to memory of 2724 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 31 PID 1724 wrote to memory of 2724 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 31 PID 1724 wrote to memory of 2724 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 31 PID 1724 wrote to memory of 2312 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2312 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2312 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2312 1724 dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe 32 PID 2724 wrote to memory of 2604 2724 goqi.exe 34 PID 2724 wrote to memory of 2604 2724 goqi.exe 34 PID 2724 wrote to memory of 2604 2724 goqi.exe 34 PID 2724 wrote to memory of 2604 2724 goqi.exe 34 PID 2724 wrote to memory of 2604 2724 goqi.exe 34 PID 2724 wrote to memory of 2604 2724 goqi.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfb88b02f63ed6cdab5e891ea96d0b33_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\goqi.exe"C:\Users\Admin\goqi.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2228.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD518354811289367ad8a5086848a3ae639
SHA15bdd2f994225dd7e5044e8dfc7ef36b0ef126e73
SHA2560b7284bbb7e894c7bf0a86ab16f24625cee48d99be304aae7baa488cdc8616d4
SHA51262158cafbd626627d1d2069d10049f347d41adb2d44a58dd88c9c0d49a3d9d5c64f3610e618e36ae079fea11b1f575390719a8966660795feaff69861451f7b2
-
Filesize
273KB
MD5dfb88b02f63ed6cdab5e891ea96d0b33
SHA16fb1de517d54d48ac4e3b60256532c667be07b59
SHA25669b07662024f000cf1fb480d083e4def873b45981f9c82d3230ce9a0265addc2
SHA512608d8a9435c557ec4b2184104fff137b5f24180a0d61868f9ee8872fed1fde8c2741788b7761190e848764fa231d18c7fbd861f7dabd6e119513fa6401f3e922