Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe
-
Size
246KB
-
MD5
3ad9b12cbfa962da1d348b26cedb62be
-
SHA1
3d0044c9f144ce76e2301c0c3a6ae2bd391de740
-
SHA256
b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e
-
SHA512
1cd52b441343c71f6638dcacd2731ed415b53a271b2c064e3ea769ebdee371f52793d35bf75a77e093107b48ed1d71c6570010f25f7d4cefc4d39ffdc3b11b71
-
SSDEEP
3072:g7Jxh2xryErd36x5I2b2VpN7O+NIjzit/WrxpzbgqruXhs7sxkgaBChU/pZa9uDB:+2xmE56x5IXmiRuzbgwu6QigabwVf
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\oexzwhzn = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2684 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\oexzwhzn\ImagePath = "C:\\Windows\\SysWOW64\\oexzwhzn\\xywgjchs.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2208 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 xywgjchs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 2208 2668 xywgjchs.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1484 sc.exe 2692 sc.exe 1240 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xywgjchs.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2820 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 30 PID 2872 wrote to memory of 2820 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 30 PID 2872 wrote to memory of 2820 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 30 PID 2872 wrote to memory of 2820 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 30 PID 2872 wrote to memory of 2088 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 32 PID 2872 wrote to memory of 2088 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 32 PID 2872 wrote to memory of 2088 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 32 PID 2872 wrote to memory of 2088 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 32 PID 2872 wrote to memory of 1484 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 34 PID 2872 wrote to memory of 1484 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 34 PID 2872 wrote to memory of 1484 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 34 PID 2872 wrote to memory of 1484 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 34 PID 2872 wrote to memory of 2692 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 36 PID 2872 wrote to memory of 2692 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 36 PID 2872 wrote to memory of 2692 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 36 PID 2872 wrote to memory of 2692 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 36 PID 2872 wrote to memory of 1240 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 38 PID 2872 wrote to memory of 1240 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 38 PID 2872 wrote to memory of 1240 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 38 PID 2872 wrote to memory of 1240 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 38 PID 2872 wrote to memory of 2684 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 41 PID 2872 wrote to memory of 2684 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 41 PID 2872 wrote to memory of 2684 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 41 PID 2872 wrote to memory of 2684 2872 JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe 41 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43 PID 2668 wrote to memory of 2208 2668 xywgjchs.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oexzwhzn\2⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xywgjchs.exe" C:\Windows\SysWOW64\oexzwhzn\2⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create oexzwhzn binPath= "C:\Windows\SysWOW64\oexzwhzn\xywgjchs.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description oexzwhzn "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oexzwhzn2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\oexzwhzn\xywgjchs.exeC:\Windows\SysWOW64\oexzwhzn\xywgjchs.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6ae7251deb7aa169a16112515e94ac61942559ceeb2451c7c9c743214fef37e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD59b907fead78292c56a30dcfe34dbd456
SHA1517ab0dcc3570bea7ddfe92530fcb2376cccac6c
SHA2560929d4b1f1bee9f4aeb7fa8c9a02e628e748accfb59edf783ec377db76eeb43a
SHA512c5ac5073e798ac109960e24c1736003440dd619f63a45f964c9429a6c9e1d61b22aeb14ca7ffebeafd1f3f058c5c0e61d6ed73b918f41c87c35b0ce2d1b52fe0