Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe
-
Size
164KB
-
MD5
ef9919f9069d7dbc5dd623483cb4cab5
-
SHA1
15dc95800da86f01c4ab3461f5d1549e3804d490
-
SHA256
ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121
-
SHA512
af859aa71534c3359e6dd88a86239046b34c43809a6cf35a067ab2bb114b509625f430ff7c24ddefbd5b16802cd12095cd224801102985607e3f73008eec9698
-
SSDEEP
1536:jJI8UMLeRaE1C6XYLrh8PLTCJdFoCEhpgtXsP+qrdeZQ5rRzBOGGtw1arhK5AICp:j1usACEj6Wz316K5LVau9VS9H6l
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2564 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\amdrplwy\ImagePath = "C:\\Windows\\SysWOW64\\amdrplwy\\qxayzzpd.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe -
Deletes itself 1 IoCs
pid Process 116 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 qxayzzpd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1912 set thread context of 116 1912 qxayzzpd.exe 98 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2384 sc.exe 4228 sc.exe 1260 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 184 612 WerFault.exe 81 4224 1912 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxayzzpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 612 wrote to memory of 5072 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 82 PID 612 wrote to memory of 5072 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 82 PID 612 wrote to memory of 5072 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 82 PID 612 wrote to memory of 4252 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 84 PID 612 wrote to memory of 4252 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 84 PID 612 wrote to memory of 4252 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 84 PID 612 wrote to memory of 2384 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 86 PID 612 wrote to memory of 2384 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 86 PID 612 wrote to memory of 2384 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 86 PID 612 wrote to memory of 4228 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 88 PID 612 wrote to memory of 4228 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 88 PID 612 wrote to memory of 4228 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 88 PID 612 wrote to memory of 1260 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 90 PID 612 wrote to memory of 1260 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 90 PID 612 wrote to memory of 1260 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 90 PID 612 wrote to memory of 2564 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 93 PID 612 wrote to memory of 2564 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 93 PID 612 wrote to memory of 2564 612 JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe 93 PID 1912 wrote to memory of 116 1912 qxayzzpd.exe 98 PID 1912 wrote to memory of 116 1912 qxayzzpd.exe 98 PID 1912 wrote to memory of 116 1912 qxayzzpd.exe 98 PID 1912 wrote to memory of 116 1912 qxayzzpd.exe 98 PID 1912 wrote to memory of 116 1912 qxayzzpd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\amdrplwy\2⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qxayzzpd.exe" C:\Windows\SysWOW64\amdrplwy\2⤵
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create amdrplwy binPath= "C:\Windows\SysWOW64\amdrplwy\qxayzzpd.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description amdrplwy "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start amdrplwy2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 612 -s 12042⤵
- Program crash
PID:184
-
-
C:\Windows\SysWOW64\amdrplwy\qxayzzpd.exeC:\Windows\SysWOW64\amdrplwy\qxayzzpd.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ee8971669604d991bb835184b977c9d2c7fb8d24da37d4c4006e12719578b121.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 5162⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 612 -ip 6121⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1912 -ip 19121⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD5bb4edccf9541a2297ee2663017e8bac2
SHA1160bc7802a071a34e50c1b68e080555ad9ca84f7
SHA256c754e9893b94f836b3a39630a2a9acd6b27093f9f47909301637614c345c36a8
SHA51256e8ef6bd77bbb2ff258acb7ed346f08a883ea5faea169bf4cfdfcb6fd381bead2c59495eb6d9e9e2493c1e88466c1c2a7ca22f796780780184fd501b02df125