Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe
-
Size
146KB
-
MD5
35d2e76123aacdc2f711476cdf0fafc0
-
SHA1
9836b00a794764404d6b67d31f0108cb32bdd6ec
-
SHA256
b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00
-
SHA512
bcd513d186e8af75eeb350d62c2560efd59cc23018761936b2605f83921f39bac32cb5c052e380448eb35c372bd0f931a0338f1bef3ecbb93c2a0eba61ad290f
-
SSDEEP
1536:yfISSdp/jPWfoqVxFY7VY0e4ahObF8OXkZh3uJp+Q7Jgz70J62CAWhJz:yFYpafoqZaLFLXkTqfPM2CA8Jz
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ftzelfjv = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2944 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ftzelfjv\ImagePath = "C:\\Windows\\SysWOW64\\ftzelfjv\\ahfqvqes.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2392 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 ahfqvqes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 2392 2732 ahfqvqes.exe 44 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2940 sc.exe 2896 sc.exe 2924 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahfqvqes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2084 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 31 PID 2332 wrote to memory of 2084 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 31 PID 2332 wrote to memory of 2084 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 31 PID 2332 wrote to memory of 2084 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 31 PID 2332 wrote to memory of 2356 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 33 PID 2332 wrote to memory of 2356 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 33 PID 2332 wrote to memory of 2356 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 33 PID 2332 wrote to memory of 2356 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 33 PID 2332 wrote to memory of 2940 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 35 PID 2332 wrote to memory of 2940 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 35 PID 2332 wrote to memory of 2940 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 35 PID 2332 wrote to memory of 2940 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 35 PID 2332 wrote to memory of 2896 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 37 PID 2332 wrote to memory of 2896 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 37 PID 2332 wrote to memory of 2896 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 37 PID 2332 wrote to memory of 2896 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 37 PID 2332 wrote to memory of 2924 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 39 PID 2332 wrote to memory of 2924 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 39 PID 2332 wrote to memory of 2924 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 39 PID 2332 wrote to memory of 2924 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 39 PID 2332 wrote to memory of 2944 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 42 PID 2332 wrote to memory of 2944 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 42 PID 2332 wrote to memory of 2944 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 42 PID 2332 wrote to memory of 2944 2332 JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe 42 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44 PID 2732 wrote to memory of 2392 2732 ahfqvqes.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ftzelfjv\2⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ahfqvqes.exe" C:\Windows\SysWOW64\ftzelfjv\2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ftzelfjv binPath= "C:\Windows\SysWOW64\ftzelfjv\ahfqvqes.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ftzelfjv "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ftzelfjv2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\ftzelfjv\ahfqvqes.exeC:\Windows\SysWOW64\ftzelfjv\ahfqvqes.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b53cde44f664b97dcdeb95e795a503bf1ea0459aec569e7fd720eae00465df00.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD55d1c3cd0b189cff3836b46cd1f5cbeb6
SHA1cc2de7702f4d6060082a062797d37ae44ce45fc4
SHA256ed47d0028b711b0f38eac5b417c50398e83ea471350558179a1f2f2dc70854d2
SHA5127fbcb8df3033ebb9f75bc01ea837e83ae6115530d10828dbdab91fd09d890016f706c1ed12ffc20a471d74aaa904e2d13da94b5f058083a9c2f4d62130ae40d7