Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe
-
Size
237KB
-
MD5
1191183d3c4cca2e9799d6a6d1c67b18
-
SHA1
6924ade5ffeef5b226223b83820e0e7c962a6102
-
SHA256
a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c
-
SHA512
7dcf7b30bb597917996ae1b22125df13127ee0a67242440c4b1ca3d7eb3f14f7435d180b1141d7c0cdee6e50891398ccac2a05c7953b372173b20bd66b282353
-
SSDEEP
6144:64Mm3W6nJ+lQ/7O3gLtA3wdZwwisdBLyJFJN5P0:6dbYJ+lQMgLtAgtiMxyJFJNN0
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\zwageczq = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2700 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zwageczq\ImagePath = "C:\\Windows\\SysWOW64\\zwageczq\\igqooend.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2580 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 igqooend.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2580 2808 igqooend.exe 44 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2828 sc.exe 2688 sc.exe 2744 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igqooend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 868 wrote to memory of 3016 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 31 PID 868 wrote to memory of 3016 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 31 PID 868 wrote to memory of 3016 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 31 PID 868 wrote to memory of 3016 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 31 PID 868 wrote to memory of 2084 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 33 PID 868 wrote to memory of 2084 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 33 PID 868 wrote to memory of 2084 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 33 PID 868 wrote to memory of 2084 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 33 PID 868 wrote to memory of 2828 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 35 PID 868 wrote to memory of 2828 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 35 PID 868 wrote to memory of 2828 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 35 PID 868 wrote to memory of 2828 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 35 PID 868 wrote to memory of 2688 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 37 PID 868 wrote to memory of 2688 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 37 PID 868 wrote to memory of 2688 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 37 PID 868 wrote to memory of 2688 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 37 PID 868 wrote to memory of 2744 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 39 PID 868 wrote to memory of 2744 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 39 PID 868 wrote to memory of 2744 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 39 PID 868 wrote to memory of 2744 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 39 PID 868 wrote to memory of 2700 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 42 PID 868 wrote to memory of 2700 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 42 PID 868 wrote to memory of 2700 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 42 PID 868 wrote to memory of 2700 868 JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe 42 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44 PID 2808 wrote to memory of 2580 2808 igqooend.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zwageczq\2⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\igqooend.exe" C:\Windows\SysWOW64\zwageczq\2⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zwageczq binPath= "C:\Windows\SysWOW64\zwageczq\igqooend.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zwageczq "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zwageczq2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\zwageczq\igqooend.exeC:\Windows\SysWOW64\zwageczq\igqooend.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3adb0166f99e3d6632f0c915e9bf9361223b42639703f13873d9a1934e6797c.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD5272e3d689f5215bd643f70f499ff0137
SHA1e65e39c8336b777863a040eb2ede8d017a7d539d
SHA2566a06a829731f0fd8c3015882f9cb3d2b3daafe696233a54972a69ae8b0b7eb73
SHA512bbd68b2729aea486c89967698514980a8cbef6c036a14b150d18de00b5746f47ff987039cd48e68513d211d562f8ace973dc441a6db55ce838b5d61461d96fe1