Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe
-
Size
238KB
-
MD5
1854bf09896c03053dbc0a9bb214d346
-
SHA1
7b5744d026e9a5f7965f1ebf3625070c638ea2ef
-
SHA256
a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3
-
SHA512
d261cd4150e913e7944df01592b255b021a51ecd2f6054f1db326acdd31b4b85989ae09221509e03977320d44e8f94dd2e05f9c3af48bbc009d93f9e6cde4cc4
-
SSDEEP
6144:pNeWb3UACOZBOzSc1OItX7ITsq7igavwVf:pN9b37tZBkvnX79
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 632 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dlanaatw\ImagePath = "C:\\Windows\\SysWOW64\\dlanaatw\\qfgmzked.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe -
Deletes itself 1 IoCs
pid Process 3452 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 qfgmzked.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3640 set thread context of 3452 3640 qfgmzked.exe 101 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4928 sc.exe 1460 sc.exe 364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3760 2324 WerFault.exe 82 4912 3640 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfgmzked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2324 wrote to memory of 5008 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 83 PID 2324 wrote to memory of 5008 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 83 PID 2324 wrote to memory of 5008 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 83 PID 2324 wrote to memory of 3312 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 85 PID 2324 wrote to memory of 3312 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 85 PID 2324 wrote to memory of 3312 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 85 PID 2324 wrote to memory of 4928 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 87 PID 2324 wrote to memory of 4928 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 87 PID 2324 wrote to memory of 4928 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 87 PID 2324 wrote to memory of 1460 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 89 PID 2324 wrote to memory of 1460 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 89 PID 2324 wrote to memory of 1460 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 89 PID 2324 wrote to memory of 364 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 92 PID 2324 wrote to memory of 364 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 92 PID 2324 wrote to memory of 364 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 92 PID 2324 wrote to memory of 632 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 95 PID 2324 wrote to memory of 632 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 95 PID 2324 wrote to memory of 632 2324 JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe 95 PID 3640 wrote to memory of 3452 3640 qfgmzked.exe 101 PID 3640 wrote to memory of 3452 3640 qfgmzked.exe 101 PID 3640 wrote to memory of 3452 3640 qfgmzked.exe 101 PID 3640 wrote to memory of 3452 3640 qfgmzked.exe 101 PID 3640 wrote to memory of 3452 3640 qfgmzked.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dlanaatw\2⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qfgmzked.exe" C:\Windows\SysWOW64\dlanaatw\2⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dlanaatw binPath= "C:\Windows\SysWOW64\dlanaatw\qfgmzked.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dlanaatw "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dlanaatw2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:364
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 10402⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\dlanaatw\qfgmzked.exeC:\Windows\SysWOW64\dlanaatw\qfgmzked.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a76073552688bcc6ca3de18c2e7e2394bfb2b3808f8a7d66f51e331373d332f3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 5122⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2324 -ip 23241⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3640 -ip 36401⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD5269d12354fd3c2eaa0b51152d0ac975f
SHA1ef6bdf98ab0eface3d82b9aaa2bc8c31b7476439
SHA256cc86a3e409e6c74eed47d956dbe65ae96698746271dd80eeb6d83fcf4b23302b
SHA512819117b95b14bd53cf9885a375bd767576714b27e42f9aa4603b2619f2086e49aff21e5ce7597e6007138e1d7f33389439926c6b2c747cd8231af51e57dbb737