Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe
-
Size
173KB
-
MD5
9f9ae6890b75d02bd12c641689feb0f3
-
SHA1
b061f73eb4bffc740d14b8c60506e366ee6eb010
-
SHA256
809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61
-
SHA512
edc30a5fdebd31710f61aeddcffb47f98e51afa168ab0a31af1134c8942049bdb000cc1dd625dd11ff55621c7167789a27668a19dad76b07414765e6a3f6ba9a
-
SSDEEP
3072:D7pw2Al1wUlCE0zZaGRRE2esjjc7XxxL33jai2:pHAl1wUcE0zZaGRRksAXxxL3T6
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2800 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hazutmig\ImagePath = "C:\\Windows\\SysWOW64\\hazutmig\\dmvdrjra.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe -
Deletes itself 1 IoCs
pid Process 4904 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3712 dmvdrjra.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3712 set thread context of 4904 3712 dmvdrjra.exe 94 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 508 sc.exe 1744 sc.exe 1408 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmvdrjra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2896 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 83 PID 4116 wrote to memory of 2896 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 83 PID 4116 wrote to memory of 2896 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 83 PID 4116 wrote to memory of 4716 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 85 PID 4116 wrote to memory of 4716 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 85 PID 4116 wrote to memory of 4716 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 85 PID 4116 wrote to memory of 1408 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 87 PID 4116 wrote to memory of 1408 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 87 PID 4116 wrote to memory of 1408 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 87 PID 4116 wrote to memory of 508 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 89 PID 4116 wrote to memory of 508 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 89 PID 4116 wrote to memory of 508 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 89 PID 4116 wrote to memory of 1744 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 91 PID 4116 wrote to memory of 1744 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 91 PID 4116 wrote to memory of 1744 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 91 PID 3712 wrote to memory of 4904 3712 dmvdrjra.exe 94 PID 3712 wrote to memory of 4904 3712 dmvdrjra.exe 94 PID 3712 wrote to memory of 4904 3712 dmvdrjra.exe 94 PID 3712 wrote to memory of 4904 3712 dmvdrjra.exe 94 PID 3712 wrote to memory of 4904 3712 dmvdrjra.exe 94 PID 4116 wrote to memory of 2800 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 95 PID 4116 wrote to memory of 2800 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 95 PID 4116 wrote to memory of 2800 4116 JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hazutmig\2⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dmvdrjra.exe" C:\Windows\SysWOW64\hazutmig\2⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hazutmig binPath= "C:\Windows\SysWOW64\hazutmig\dmvdrjra.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hazutmig "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:508
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hazutmig2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\hazutmig\dmvdrjra.exeC:\Windows\SysWOW64\hazutmig\dmvdrjra.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4904
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.2MB
MD582b2b0d2c6cf889da099d51a61a54b6f
SHA10b681158eacfeb2f4096e5afa3de498fad9cb968
SHA25672e5de285c892fb2b6ad1b159532a9d8e886e4c62d410e7b79bf61c28f55ea73
SHA5121302e6f0d75e4645cc8ef7612c6478bab533f818d920a62c689f903456afd3ed55e3cff58859050ec518e7eea3ab31ccee0fbcd99f3573206e40a0fcd5256ef9