Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe
-
Size
165KB
-
MD5
9659c961b58202bc02849a619f0301cc
-
SHA1
874143f8e0d3fbe239b53e93635368e9cf600aaa
-
SHA256
a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436
-
SHA512
cd8016808d502de4b223d6789e864a3623dec43ffa0dac7a5fc088d2f00b69141bd54e9af020c43ec2dfe7c6be6e53f9fd83a65683311dee03751edd0ad4f097
-
SSDEEP
3072:wVebA+J1ZB4rE7coWgd+P+QKcdqd0Tnsie492:nbAS1Z+owoB06jusyk
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4264 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 okzzelri.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 3608 1480 okzzelri.exe 93 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1796 sc.exe 3976 sc.exe 3168 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okzzelri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1868 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 82 PID 2832 wrote to memory of 1868 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 82 PID 2832 wrote to memory of 1868 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 82 PID 2832 wrote to memory of 980 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 84 PID 2832 wrote to memory of 980 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 84 PID 2832 wrote to memory of 980 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 84 PID 2832 wrote to memory of 1796 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 86 PID 2832 wrote to memory of 1796 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 86 PID 2832 wrote to memory of 1796 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 86 PID 2832 wrote to memory of 3976 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 88 PID 2832 wrote to memory of 3976 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 88 PID 2832 wrote to memory of 3976 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 88 PID 2832 wrote to memory of 3168 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 90 PID 2832 wrote to memory of 3168 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 90 PID 2832 wrote to memory of 3168 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 90 PID 1480 wrote to memory of 3608 1480 okzzelri.exe 93 PID 1480 wrote to memory of 3608 1480 okzzelri.exe 93 PID 1480 wrote to memory of 3608 1480 okzzelri.exe 93 PID 1480 wrote to memory of 3608 1480 okzzelri.exe 93 PID 1480 wrote to memory of 3608 1480 okzzelri.exe 93 PID 2832 wrote to memory of 4264 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 94 PID 2832 wrote to memory of 4264 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 94 PID 2832 wrote to memory of 4264 2832 JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\geckiezt\2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\okzzelri.exe" C:\Windows\SysWOW64\geckiezt\2⤵
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create geckiezt binPath= "C:\Windows\SysWOW64\geckiezt\okzzelri.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description geckiezt "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start geckiezt2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3168
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\geckiezt\okzzelri.exeC:\Windows\SysWOW64\geckiezt\okzzelri.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.0MB
MD516cb93fe4184314db764b11ec9def8ba
SHA1df7bcc25d70c2199d053db5b04c2c9eedf57b8e0
SHA256665ded072edc8c28f94e5fc69b277ff5879a708bb7e31cf4dbcf7506d378899c
SHA5126831ced63ee95be6c5d14bb07b155d744e9eeb0b6aa4bec7b7ba2fa3809a46d9cd23d79cec97f141da9d933b825b25c3ed1ced80da7c00272434a6f418e9d262