Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe
-
Size
244KB
-
MD5
ca1b0fab6b22d571f44f4e0b320b0c36
-
SHA1
36db18567393b5467f562ab9266f7bcd6c08cc81
-
SHA256
c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847
-
SHA512
fb0f7c95a00ac0e6894c8ffcbe0de7b4c1430065fb63f7b0241a54521f28387024984070de81778869714c879520ea3df4d0e6a1d388f3815b31ba65be7dee4b
-
SSDEEP
6144:LTZQCW0TZlWoHtNiVqFYcmW5jpkGk9Rc8:fZzTZlWqtEjcmc1kGr
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1352 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tligvjiq\ImagePath = "C:\\Windows\\SysWOW64\\tligvjiq\\dpkhonnb.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe -
Deletes itself 1 IoCs
pid Process 4952 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 dpkhonnb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 4952 1712 dpkhonnb.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1576 sc.exe 4956 sc.exe 832 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4172 428 WerFault.exe 84 2400 1712 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpkhonnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 428 wrote to memory of 4516 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 85 PID 428 wrote to memory of 4516 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 85 PID 428 wrote to memory of 4516 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 85 PID 428 wrote to memory of 3712 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 87 PID 428 wrote to memory of 3712 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 87 PID 428 wrote to memory of 3712 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 87 PID 428 wrote to memory of 832 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 89 PID 428 wrote to memory of 832 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 89 PID 428 wrote to memory of 832 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 89 PID 428 wrote to memory of 1576 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 92 PID 428 wrote to memory of 1576 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 92 PID 428 wrote to memory of 1576 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 92 PID 428 wrote to memory of 4956 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 94 PID 428 wrote to memory of 4956 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 94 PID 428 wrote to memory of 4956 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 94 PID 428 wrote to memory of 1352 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 97 PID 428 wrote to memory of 1352 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 97 PID 428 wrote to memory of 1352 428 JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe 97 PID 1712 wrote to memory of 4952 1712 dpkhonnb.exe 103 PID 1712 wrote to memory of 4952 1712 dpkhonnb.exe 103 PID 1712 wrote to memory of 4952 1712 dpkhonnb.exe 103 PID 1712 wrote to memory of 4952 1712 dpkhonnb.exe 103 PID 1712 wrote to memory of 4952 1712 dpkhonnb.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tligvjiq\2⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dpkhonnb.exe" C:\Windows\SysWOW64\tligvjiq\2⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tligvjiq binPath= "C:\Windows\SysWOW64\tligvjiq\dpkhonnb.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tligvjiq "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tligvjiq2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 10362⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\tligvjiq\dpkhonnb.exeC:\Windows\SysWOW64\tligvjiq\dpkhonnb.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4464b306d676d84d4597682148ecfbcfb64eeb8516dcc24b447fb1ba42df847.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 5122⤵
- Program crash
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 428 -ip 4281⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1712 -ip 17121⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD53f4c63776f26041be1be30b427baf0a4
SHA16cf1efa210ce40f349a8bd809f1522fc11c18551
SHA25656bfe5b00deae68ba84116d4d8dcc13ec4e42d64a1b8180a042e3ed61e6999ed
SHA5128f7d94711321b592659581d621e98e60bf14543e486b85bda36daa4d260a6dc0ba41dd9e614b201ef063b7dabb6bff1a47487f84635d4cb5e055fb9af7aed735