Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe
-
Size
175KB
-
MD5
a3e8a4ea8c06001b1d17198c38505e74
-
SHA1
fc87f5b0f5bd9448ac169693cac4e89af11cdd4c
-
SHA256
bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492
-
SHA512
294c00df759e3631ab6607afac25c15ae70eabd8cd68dffe4c921f6af6f06cb668989688d13c256c8e33fe0ae437273c48309e95b7c8782fe06baf5be0bbc51b
-
SSDEEP
3072:nODfLSAVPUAMY9e2r6JGH71FXvTGGPCUWk0+WrxpzbgqruT9s9TbB:nODfLFUAMOcGXvzCF+uzbgwuT0B
Malware Config
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\toefqvrh = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2580 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\toefqvrh\ImagePath = "C:\\Windows\\SysWOW64\\toefqvrh\\uuhidtyj.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2916 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 uuhidtyj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 2916 2544 uuhidtyj.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2584 sc.exe 2636 sc.exe 1844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuhidtyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2764 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 30 PID 1792 wrote to memory of 2764 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 30 PID 1792 wrote to memory of 2764 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 30 PID 1792 wrote to memory of 2764 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 30 PID 1792 wrote to memory of 2680 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 32 PID 1792 wrote to memory of 2680 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 32 PID 1792 wrote to memory of 2680 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 32 PID 1792 wrote to memory of 2680 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 32 PID 1792 wrote to memory of 2584 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 34 PID 1792 wrote to memory of 2584 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 34 PID 1792 wrote to memory of 2584 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 34 PID 1792 wrote to memory of 2584 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 34 PID 1792 wrote to memory of 2636 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 36 PID 1792 wrote to memory of 2636 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 36 PID 1792 wrote to memory of 2636 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 36 PID 1792 wrote to memory of 2636 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 36 PID 1792 wrote to memory of 1844 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 38 PID 1792 wrote to memory of 1844 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 38 PID 1792 wrote to memory of 1844 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 38 PID 1792 wrote to memory of 1844 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 38 PID 1792 wrote to memory of 2580 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 41 PID 1792 wrote to memory of 2580 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 41 PID 1792 wrote to memory of 2580 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 41 PID 1792 wrote to memory of 2580 1792 JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe 41 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43 PID 2544 wrote to memory of 2916 2544 uuhidtyj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\toefqvrh\2⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\uuhidtyj.exe" C:\Windows\SysWOW64\toefqvrh\2⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create toefqvrh binPath= "C:\Windows\SysWOW64\toefqvrh\uuhidtyj.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description toefqvrh "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start toefqvrh2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\toefqvrh\uuhidtyj.exeC:\Windows\SysWOW64\toefqvrh\uuhidtyj.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.9MB
MD55600db38681894a59a4c1cfa3d31f188
SHA1e0d56a53cb7a8f9df6e7be21e389e02d9919b8f3
SHA25696c80261765e251cb5608de60df32857c26a58b4fe671754d924779ec8790b86
SHA5122e451cda791a72bd32c0d93bc0194b7f834379c9bb3e2f9c5e5f88c7157df489081a80de7fcae84392ff5e6096520f3ba0893798c3421389e385969a0ea6d701