Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe
-
Size
343KB
-
MD5
8bac9589ab10735825e69f14afe283b4
-
SHA1
d7e4c66cd54b61258a08b3ef44f6c6919b3b51e4
-
SHA256
59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085
-
SHA512
c48d4a9dc8387a1a81c77095f060c874a3c0860d4070769ccbf3fd92b9d43310a6dc62b17f7f6f30cfc61b1e7baed3b465f9eecdf8d0d2aca9a5420cbba42dc5
-
SSDEEP
3072:vPW6RBNZQyyT0TXOtpkAx1O/kCcNVPImEWOrle9rcQLRDLspSiyl2kBxLWhW/9X6:3DUEk/OqIQOrletcQVH2kDaQ/9O3tHt
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\bandhmdp = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3044 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bandhmdp\ImagePath = "C:\\Windows\\SysWOW64\\bandhmdp\\zeoesx.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2264 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 zeoesx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2264 3052 zeoesx.exe 42 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2824 sc.exe 2928 sc.exe 2864 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeoesx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1508 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 29 PID 2052 wrote to memory of 1508 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 29 PID 2052 wrote to memory of 1508 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 29 PID 2052 wrote to memory of 1508 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 29 PID 2052 wrote to memory of 2380 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 31 PID 2052 wrote to memory of 2380 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 31 PID 2052 wrote to memory of 2380 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 31 PID 2052 wrote to memory of 2380 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 31 PID 2052 wrote to memory of 2928 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 33 PID 2052 wrote to memory of 2928 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 33 PID 2052 wrote to memory of 2928 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 33 PID 2052 wrote to memory of 2928 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 33 PID 2052 wrote to memory of 2864 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 35 PID 2052 wrote to memory of 2864 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 35 PID 2052 wrote to memory of 2864 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 35 PID 2052 wrote to memory of 2864 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 35 PID 2052 wrote to memory of 2824 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 37 PID 2052 wrote to memory of 2824 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 37 PID 2052 wrote to memory of 2824 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 37 PID 2052 wrote to memory of 2824 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 37 PID 2052 wrote to memory of 3044 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 39 PID 2052 wrote to memory of 3044 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 39 PID 2052 wrote to memory of 3044 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 39 PID 2052 wrote to memory of 3044 2052 JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe 39 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42 PID 3052 wrote to memory of 2264 3052 zeoesx.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bandhmdp\2⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zeoesx.exe" C:\Windows\SysWOW64\bandhmdp\2⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bandhmdp binPath= "C:\Windows\SysWOW64\bandhmdp\zeoesx.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bandhmdp "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bandhmdp2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\bandhmdp\zeoesx.exeC:\Windows\SysWOW64\bandhmdp\zeoesx.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59376aedb4b6ed98c11e98f46edff7c62e159a6d4d63ed2eaaa46805006b0085.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD57a814602cfc7533406b8de92a3f31b24
SHA17f595970c4fbbd3acfb336bff29767a2f403a2cf
SHA25692b40407782cd2a6cb8afa1fb70b2e186c7a258925ea2a02586c4fb7d1831aae
SHA512058c08a2eadc106a60b68b49205b837f650971213476c093186f3ea49740f35be120707ff6b46845b650a2ceff5416aa39f4b74acbacdf8161c01d7546ff67c1