Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe
-
Size
154KB
-
MD5
1417d3bfef9f5d4b068124f9df853f88
-
SHA1
e82683043a292e42abd968422ada90f2ad3a6a26
-
SHA256
3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55
-
SHA512
dc47bb34b28bc64be767f2569cb88c8d4401b00fc8eeea0b7cc7b4156c3036484b87f308f447c310d1ac40c711a78d4738f1c1cc4619df196ed9e4cc7f23170d
-
SSDEEP
1536:93XTaOHdVEPzF68p31lwV95rPFlhyg6yrfAvKm5A5XzcwC1sulQoPt/CD6Hnz:9zamdNYlY5Z7y44Sm5A5X2ODo0OHz
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 972 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hhslvmre\ImagePath = "C:\\Windows\\SysWOW64\\hhslvmre\\ahkijjzn.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe -
Deletes itself 1 IoCs
pid Process 1588 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 ahkijjzn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 1588 4808 ahkijjzn.exe 95 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2940 sc.exe 1028 sc.exe 1184 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahkijjzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1684 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 82 PID 4588 wrote to memory of 1684 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 82 PID 4588 wrote to memory of 1684 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 82 PID 4588 wrote to memory of 4304 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 84 PID 4588 wrote to memory of 4304 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 84 PID 4588 wrote to memory of 4304 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 84 PID 4588 wrote to memory of 1028 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 86 PID 4588 wrote to memory of 1028 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 86 PID 4588 wrote to memory of 1028 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 86 PID 4588 wrote to memory of 1184 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 88 PID 4588 wrote to memory of 1184 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 88 PID 4588 wrote to memory of 1184 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 88 PID 4588 wrote to memory of 2940 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 90 PID 4588 wrote to memory of 2940 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 90 PID 4588 wrote to memory of 2940 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 90 PID 4588 wrote to memory of 972 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 93 PID 4588 wrote to memory of 972 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 93 PID 4588 wrote to memory of 972 4588 JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe 93 PID 4808 wrote to memory of 1588 4808 ahkijjzn.exe 95 PID 4808 wrote to memory of 1588 4808 ahkijjzn.exe 95 PID 4808 wrote to memory of 1588 4808 ahkijjzn.exe 95 PID 4808 wrote to memory of 1588 4808 ahkijjzn.exe 95 PID 4808 wrote to memory of 1588 4808 ahkijjzn.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hhslvmre\2⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ahkijjzn.exe" C:\Windows\SysWOW64\hhslvmre\2⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hhslvmre binPath= "C:\Windows\SysWOW64\hhslvmre\ahkijjzn.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hhslvmre "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hhslvmre2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:972
-
-
C:\Windows\SysWOW64\hhslvmre\ahkijjzn.exeC:\Windows\SysWOW64\hhslvmre\ahkijjzn.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3053837114eb098cb0fde68bb99db208eb69035b9af2c133a83971f05bf22e55.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD5828c1abbc7a6d334e5bf4edc3a570070
SHA17c56e497722d565ea5760800dd97e05581eb7523
SHA256636a65f8f0af07d994a263b9abf13e94d24264c0149ff24eb8d2a0aac8cd283f
SHA512e599c3ee1a33c46b9e467cdda4e4951b3772a9e66080430b654e2b116e3e386261f2c425d519636890b84d8dd54262312058b881d0a32f547ec812b72b7638b1