Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe
-
Size
169KB
-
MD5
5a3bb3813a61da85d329eee5f1ed86e1
-
SHA1
bd25da233d0a6cf7e83dcb8a1fcf32bfe54692c0
-
SHA256
d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff
-
SHA512
53b2294a3bf250896644ed0eccb3b98f72d440baf85e97ca87f92d985bf40e6d123c92289e518dd6da7f10eee8389074d9acfa3703cc0c26a336c46752570b3a
-
SSDEEP
3072:ePnHfTpEBXlX/dA3FdrJS/SfeqJWHzqWdpMFIXwo2:gnHLpEBXlPdA3Fi/rqJezBpMGE
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4888 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jvmxuyof\ImagePath = "C:\\Windows\\SysWOW64\\jvmxuyof\\ohcoshs.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe -
Deletes itself 1 IoCs
pid Process 4392 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 ohcoshs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 4392 2200 ohcoshs.exe 97 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3212 sc.exe 2192 sc.exe 1648 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3932 3692 WerFault.exe 84 5032 2200 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohcoshs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3692 wrote to memory of 444 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 85 PID 3692 wrote to memory of 444 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 85 PID 3692 wrote to memory of 444 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 85 PID 3692 wrote to memory of 832 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 87 PID 3692 wrote to memory of 832 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 87 PID 3692 wrote to memory of 832 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 87 PID 3692 wrote to memory of 2192 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 89 PID 3692 wrote to memory of 2192 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 89 PID 3692 wrote to memory of 2192 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 89 PID 3692 wrote to memory of 1648 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 91 PID 3692 wrote to memory of 1648 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 91 PID 3692 wrote to memory of 1648 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 91 PID 3692 wrote to memory of 3212 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 94 PID 3692 wrote to memory of 3212 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 94 PID 3692 wrote to memory of 3212 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 94 PID 2200 wrote to memory of 4392 2200 ohcoshs.exe 97 PID 2200 wrote to memory of 4392 2200 ohcoshs.exe 97 PID 2200 wrote to memory of 4392 2200 ohcoshs.exe 97 PID 2200 wrote to memory of 4392 2200 ohcoshs.exe 97 PID 2200 wrote to memory of 4392 2200 ohcoshs.exe 97 PID 3692 wrote to memory of 4888 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 99 PID 3692 wrote to memory of 4888 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 99 PID 3692 wrote to memory of 4888 3692 JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jvmxuyof\2⤵
- System Location Discovery: System Language Discovery
PID:444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ohcoshs.exe" C:\Windows\SysWOW64\jvmxuyof\2⤵
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jvmxuyof binPath= "C:\Windows\SysWOW64\jvmxuyof\ohcoshs.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jvmxuyof "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jvmxuyof2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 12442⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\jvmxuyof\ohcoshs.exeC:\Windows\SysWOW64\jvmxuyof\ohcoshs.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d32222894f943562ae2125c8ad2ee7bd3f642fc25da26b8888cd37373bf4aeff.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 5442⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3692 -ip 36921⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2200 -ip 22001⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD5c3f8cf92ca6e13e672b8c96b2844d8c1
SHA106d071a11973b422c87ff6f5a518a42b78a3af8f
SHA256d7844d421c7a2e241f6a6add786a6d507c45f102d0b0f7ca0e26502333492b22
SHA512b3bbaa294ee4662c014afd63253551054a411afa28cf192b423b55727c3ec7a2fd4f75a2da65b1d9b6b3a6f280393195a50017234775287f7c30caa4e1f9b3d3