Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe
-
Size
238KB
-
MD5
8271ce4f3cbd9b09bf15c5a68e88b0da
-
SHA1
8a67d568576e34c1c6e94b61f659f450df2ef96d
-
SHA256
66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac
-
SHA512
27c67f1762515a99e1260866235aee0904685144af6f09bb5c384a0caca2e95438310b690f12e32b8d46d349d9027d2d76a589bcfdaed3c75e69ce05dd2a0bd4
-
SSDEEP
3072:a7V2YJR9xNKX/hxlknRrKpyCaU0m+J2x5UrqGjcxSVggjcGkNIVqI7sxkgaBChMg:bYr9xNKXSnQMmJWr0K7ITsq7igavwVf
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\eqwqtmst = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2576 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\eqwqtmst\ImagePath = "C:\\Windows\\SysWOW64\\eqwqtmst\\opnxatyj.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2056 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 opnxatyj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2828 set thread context of 2056 2828 opnxatyj.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2736 sc.exe 2604 sc.exe 2712 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opnxatyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2796 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 30 PID 2160 wrote to memory of 2796 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 30 PID 2160 wrote to memory of 2796 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 30 PID 2160 wrote to memory of 2796 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 30 PID 2160 wrote to memory of 2788 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 32 PID 2160 wrote to memory of 2788 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 32 PID 2160 wrote to memory of 2788 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 32 PID 2160 wrote to memory of 2788 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 32 PID 2160 wrote to memory of 2736 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 34 PID 2160 wrote to memory of 2736 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 34 PID 2160 wrote to memory of 2736 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 34 PID 2160 wrote to memory of 2736 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 34 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 36 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 36 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 36 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 36 PID 2160 wrote to memory of 2712 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 38 PID 2160 wrote to memory of 2712 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 38 PID 2160 wrote to memory of 2712 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 38 PID 2160 wrote to memory of 2712 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 38 PID 2160 wrote to memory of 2576 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 41 PID 2160 wrote to memory of 2576 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 41 PID 2160 wrote to memory of 2576 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 41 PID 2160 wrote to memory of 2576 2160 JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe 41 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43 PID 2828 wrote to memory of 2056 2828 opnxatyj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\eqwqtmst\2⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\opnxatyj.exe" C:\Windows\SysWOW64\eqwqtmst\2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create eqwqtmst binPath= "C:\Windows\SysWOW64\eqwqtmst\opnxatyj.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description eqwqtmst "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start eqwqtmst2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\eqwqtmst\opnxatyj.exeC:\Windows\SysWOW64\eqwqtmst\opnxatyj.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66a6da04154d8f34b280188ff2e675b9137622f9046912a1761e1561b7321bac.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD5f73f55ed726cc2c193910c370d439e7b
SHA12304d23abb7a83911659799596e1fb4ea24d568a
SHA2566a6739bc04c7012c750d467b9d846bbe145ea6ace7fc1d2c59b753cfca790e3d
SHA512a00f18f544f9b081cb7eb082e66c126fa940a47f60dce291895bbc6613aeace79d3574e4db997ca91f60b793ea354244872254b41305a45c35d186ccb10bc24d