Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:03

General

  • Target

    JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe

  • Size

    165KB

  • MD5

    9659c961b58202bc02849a619f0301cc

  • SHA1

    874143f8e0d3fbe239b53e93635368e9cf600aaa

  • SHA256

    a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436

  • SHA512

    cd8016808d502de4b223d6789e864a3623dec43ffa0dac7a5fc088d2f00b69141bd54e9af020c43ec2dfe7c6be6e53f9fd83a65683311dee03751edd0ad4f097

  • SSDEEP

    3072:wVebA+J1ZB4rE7coWgd+P+QKcdqd0Tnsie492:nbAS1Z+owoB06jusyk

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\geckiezt\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1868
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\okzzelri.exe" C:\Windows\SysWOW64\geckiezt\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:980
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create geckiezt binPath= "C:\Windows\SysWOW64\geckiezt\okzzelri.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1796
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description geckiezt "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3976
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start geckiezt
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3168
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4264
  • C:\Windows\SysWOW64\geckiezt\okzzelri.exe
    C:\Windows\SysWOW64\geckiezt\okzzelri.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a36d863f97755c43149b33e14b468f5227796c563a7d8cc4b7802e5a05899436.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:3608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\okzzelri.exe

      Filesize

      10.0MB

      MD5

      16cb93fe4184314db764b11ec9def8ba

      SHA1

      df7bcc25d70c2199d053db5b04c2c9eedf57b8e0

      SHA256

      665ded072edc8c28f94e5fc69b277ff5879a708bb7e31cf4dbcf7506d378899c

      SHA512

      6831ced63ee95be6c5d14bb07b155d744e9eeb0b6aa4bec7b7ba2fa3809a46d9cd23d79cec97f141da9d933b825b25c3ed1ced80da7c00272434a6f418e9d262

    • memory/1480-15-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/1480-6-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2832-13-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2832-2-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2832-11-0x00000000006A0000-0x00000000006AD000-memory.dmp

      Filesize

      52KB

    • memory/2832-12-0x00000000006B0000-0x00000000006C3000-memory.dmp

      Filesize

      76KB

    • memory/2832-0-0x00000000006A0000-0x00000000006AD000-memory.dmp

      Filesize

      52KB

    • memory/2832-14-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2832-1-0x00000000006B0000-0x00000000006C3000-memory.dmp

      Filesize

      76KB

    • memory/3608-7-0x00000000005E0000-0x00000000005F5000-memory.dmp

      Filesize

      84KB

    • memory/3608-10-0x00000000005E0000-0x00000000005F5000-memory.dmp

      Filesize

      84KB

    • memory/3608-17-0x00000000005E0000-0x00000000005F5000-memory.dmp

      Filesize

      84KB

    • memory/3608-19-0x00000000005E0000-0x00000000005F5000-memory.dmp

      Filesize

      84KB