Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe
-
Size
81KB
-
MD5
f3f46b1f53a62b77236950cbdad3f3a0
-
SHA1
682e571e3956da0885457d99119a1fb77917cf6c
-
SHA256
54468fb6e2a419631ee588c009aa81d6834c629fb07806f5efa1bede586f6805
-
SHA512
4c3c82afd367e5bbc104e1170ce5fd9cc496c2497e91a7fa7253bfbcb70a436d64d5c70c12f884663e9c77aa9ee1f96b7284f36b9a0c1ba7f69a93dc0e49df68
-
SSDEEP
1536:UiKNdEAhWWVykEMmZH3SRA3fDhYWYSLt+N+OJ:BKbhNkrYRA32bCt+NX
Malware Config
Extracted
tofsee
208.131.138.216
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4140 goqi.exe 3116 goqi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\goqi.exe\"" f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4468 set thread context of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 4140 set thread context of 3116 4140 goqi.exe 86 PID 3116 set thread context of 1708 3116 goqi.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4924 1708 WerFault.exe 88 4964 4468 WerFault.exe 81 3404 4140 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4468 wrote to memory of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 4468 wrote to memory of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 4468 wrote to memory of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 4468 wrote to memory of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 4468 wrote to memory of 988 4468 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 82 PID 988 wrote to memory of 4140 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 84 PID 988 wrote to memory of 4140 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 84 PID 988 wrote to memory of 4140 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 84 PID 4140 wrote to memory of 3116 4140 goqi.exe 86 PID 4140 wrote to memory of 3116 4140 goqi.exe 86 PID 4140 wrote to memory of 3116 4140 goqi.exe 86 PID 4140 wrote to memory of 3116 4140 goqi.exe 86 PID 4140 wrote to memory of 3116 4140 goqi.exe 86 PID 3116 wrote to memory of 1708 3116 goqi.exe 88 PID 3116 wrote to memory of 1708 3116 goqi.exe 88 PID 3116 wrote to memory of 1708 3116 goqi.exe 88 PID 3116 wrote to memory of 1708 3116 goqi.exe 88 PID 3116 wrote to memory of 1708 3116 goqi.exe 88 PID 988 wrote to memory of 1624 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 93 PID 988 wrote to memory of 1624 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 93 PID 988 wrote to memory of 1624 988 f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3f46b1f53a62b77236950cbdad3f3a0_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\goqi.exe"C:\Users\Admin\goqi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\goqi.exe"C:\Users\Admin\goqi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 3206⤵
- Program crash
PID:4924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 2964⤵
- Program crash
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5156.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 3082⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4468 -ip 44681⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4140 -ip 41401⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1708 -ip 17081⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5c6b216f59c9bc69f509273934035ceca
SHA13ef7dcc18fdf22e18ac3192d41ae577ff44bd30a
SHA2567bb1739e61245dea9f605a6680685c9a79222b92dbd17e1d495e31b9682409e8
SHA512ed0c2941d398bbf52108829412c8127944dae725628cc2816e8770ce107ee6475a8b7182c61ae46a91da9736fe63c083dadecf6bfbbe985768f755e20164c858
-
Filesize
81KB
MD5f3f46b1f53a62b77236950cbdad3f3a0
SHA1682e571e3956da0885457d99119a1fb77917cf6c
SHA25654468fb6e2a419631ee588c009aa81d6834c629fb07806f5efa1bede586f6805
SHA5124c3c82afd367e5bbc104e1170ce5fd9cc496c2497e91a7fa7253bfbcb70a436d64d5c70c12f884663e9c77aa9ee1f96b7284f36b9a0c1ba7f69a93dc0e49df68