Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 02:00

General

  • Target

    JaffaCakes118_cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559.exe

  • Size

    136KB

  • MD5

    9b65a7119b0bca572ee813bf80b152ef

  • SHA1

    34f024ed899317f7b46d61e186d9ad4be7d0e813

  • SHA256

    cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559

  • SHA512

    44a87588436df80884c5ddb95b762febe66ded454ce2310d1bfb249ba89d79014dd39b89ed1eb0d9d7e8be8cc1ffa655ee60eb74e7f2a3f4df9abb408bf6f3af

  • SSDEEP

    1536:TL0xHUcaPRbcisykYAoVIdZaR7ykf0TSRpoF2I6NHujdKAJGWa0XZ6E/9nD5zB/J:naiIiJAYPf06NO/JPa0p64JD5zJoYQ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fovkhpks\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2812
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\twupjqak.exe" C:\Windows\SysWOW64\fovkhpks\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3924
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create fovkhpks binPath= "C:\Windows\SysWOW64\fovkhpks\twupjqak.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2760
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description fovkhpks "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2764
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start fovkhpks
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3044
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:872
  • C:\Windows\SysWOW64\fovkhpks\twupjqak.exe
    C:\Windows\SysWOW64\fovkhpks\twupjqak.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cd23cbd1e13b53d1932af8dbd1a93718edb9efaf6fde950c1fe380764f464559.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Sets service image path in registry
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\twupjqak.exe

    Filesize

    10.6MB

    MD5

    a01b599a648f00cfb229e05f0fdcad52

    SHA1

    a101989ec553f5f331b1a67edb8107cd9bb0a8c3

    SHA256

    dd58d4e48a2ef8cdc5ef2c0057202d25c9631c209d252d6d0640d278a6bd0d71

    SHA512

    26b48d51f0bc4d9bba0969cfeb7bbf86821297b309710f15ad7869a6c59279fab7555c3586599cc1b626847794a487b1ed18a5c6aa479ab53aa132a8b47705cc

  • memory/2560-14-0x0000000000520000-0x0000000000535000-memory.dmp

    Filesize

    84KB

  • memory/2560-19-0x0000000000520000-0x0000000000535000-memory.dmp

    Filesize

    84KB

  • memory/2560-18-0x0000000000520000-0x0000000000535000-memory.dmp

    Filesize

    84KB

  • memory/4504-8-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/4504-9-0x00000000005D0000-0x00000000005E3000-memory.dmp

    Filesize

    76KB

  • memory/4504-1-0x00000000005F0000-0x00000000006F0000-memory.dmp

    Filesize

    1024KB

  • memory/4504-10-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4504-3-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4504-2-0x00000000005D0000-0x00000000005E3000-memory.dmp

    Filesize

    76KB

  • memory/4980-11-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/4980-13-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/4980-12-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/4980-16-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB