Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 10:11

General

  • Target

    ff7353b61dcbc157e2f89034fdb72cf0_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    ff7353b61dcbc157e2f89034fdb72cf0

  • SHA1

    9748ef9fe2a118e4c5ef75c4927a995183b96e59

  • SHA256

    319e892be206faef2546ccc009a46cb2062b15bada048d98d24dcccb6b517555

  • SHA512

    a1e64ccd703eac90809c45276d939258925d52b00250dbeb1dc837e7096078dcb02dc7864fc2bbe321535df296561e04cf906379e5f56c8c6a8096f04f71b74a

  • SSDEEP

    1536:c8Id8o7aomglQQGF+f1tUlho4swrUzgRXAnTumTO7MGFSjq0ccQL:o+o7ZmQQT+clzdUzW4imCBSjqTL

Malware Config

Extracted

Family

tofsee

C2

94.242.250.149

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff7353b61dcbc157e2f89034fdb72cf0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff7353b61dcbc157e2f89034fdb72cf0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\mzerwjck.exe
      "C:\Users\Admin\mzerwjck.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 336
          4⤵
          • Program crash
          PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0710.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4196 -ip 4196
    1⤵
      PID:1816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0710.bat

      Filesize

      266B

      MD5

      4b1ab0bd18560de50b909679547a61e3

      SHA1

      09b00025db301efc46d50fced1fabc0bd77dca2f

      SHA256

      05c8bda8c1a6cb69b34ab72efb6055b7fb7ed5eed9e6512c22af4f4f4697d397

      SHA512

      dee9437af7d27c2e6da959ab649d5223997fa5da2c0b2a925417d37147866454bba44d09d0490340c2d5853ede996f7aab745319c62087c2e92c84ae04e7dd4d

    • C:\Users\Admin\mzerwjck.exe

      Filesize

      40.6MB

      MD5

      97744a4c3ff92381e1428b90a1efa5a1

      SHA1

      e66dec3b9a283da9d7d9355a1554334a51edd33b

      SHA256

      96b8bd605266d6c7394bbc846acf4972df52024c0c5c911c65fad3ecc89707a9

      SHA512

      9feb26686056f85494a6a038a5cf3cef64f834ac91ce85a2fbb9e5a760a77c74ba1b8112b7755621a0ebb96985bfb03fc3edf0ec2c2440c765f3bb3e6fde9253

    • memory/1048-24-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1048-1-0x0000000002190000-0x00000000021A2000-memory.dmp

      Filesize

      72KB

    • memory/1048-2-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1048-0-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1048-25-0x0000000002190000-0x00000000021A2000-memory.dmp

      Filesize

      72KB

    • memory/1164-8-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1164-20-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1164-9-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1164-10-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/4196-17-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB

    • memory/4196-11-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB

    • memory/4196-14-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB

    • memory/4196-28-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4196-29-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB

    • memory/4196-30-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB