Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe
-
Size
342KB
-
MD5
1f65c044a1edce2c33c7030fb1a5d0ad
-
SHA1
df89acc38275392f832d5c8416c1a502a58a7255
-
SHA256
5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89
-
SHA512
5664d781c8da599f731ebfbbeb41907e96260f355f1c1f8a49614d97702cd066ff882aa744784696c930b73903b9eae7cda27002bd584448e8afa12399083d6e
-
SSDEEP
6144:hWwdr+RRATin3UqjCsspkgF9o81ptDPNKHJDlx4BTj:hRcu2UCCssKgF9o81ptDPNKx4B
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\zxwapygv = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2304 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zxwapygv\ImagePath = "C:\\Windows\\SysWOW64\\zxwapygv\\zjobidcr.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 632 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2460 zjobidcr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 632 2460 zjobidcr.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2724 sc.exe 2672 sc.exe 2796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjobidcr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1132 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 30 PID 2828 wrote to memory of 1132 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 30 PID 2828 wrote to memory of 1132 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 30 PID 2828 wrote to memory of 1132 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 30 PID 2828 wrote to memory of 2872 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 32 PID 2828 wrote to memory of 2872 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 32 PID 2828 wrote to memory of 2872 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 32 PID 2828 wrote to memory of 2872 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 32 PID 2828 wrote to memory of 2724 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 34 PID 2828 wrote to memory of 2724 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 34 PID 2828 wrote to memory of 2724 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 34 PID 2828 wrote to memory of 2724 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 34 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 36 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 36 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 36 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 36 PID 2828 wrote to memory of 2796 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 38 PID 2828 wrote to memory of 2796 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 38 PID 2828 wrote to memory of 2796 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 38 PID 2828 wrote to memory of 2796 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 38 PID 2828 wrote to memory of 2304 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 41 PID 2828 wrote to memory of 2304 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 41 PID 2828 wrote to memory of 2304 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 41 PID 2828 wrote to memory of 2304 2828 JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe 41 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43 PID 2460 wrote to memory of 632 2460 zjobidcr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zxwapygv\2⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zjobidcr.exe" C:\Windows\SysWOW64\zxwapygv\2⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zxwapygv binPath= "C:\Windows\SysWOW64\zxwapygv\zjobidcr.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zxwapygv "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zxwapygv2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\zxwapygv\zjobidcr.exeC:\Windows\SysWOW64\zxwapygv\zjobidcr.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c6056925d553e9289cc8af65829b87fb4c0827cde81fbb2942243a7355a7e89.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD5384523b9d9ea91c5f23bb070ccb69dbe
SHA1a24fff89bf2c4d88e7fcef8efafb05ee36486949
SHA25677d369f30712db8dc1992a02dc3beee9c1f6484d12bee28a1e43613715d42a7e
SHA512d968c27f465e7982749fa3dca82982b861e91ee6743cfd54677abfa3a0befc90ae95de672ac2bd6b6b2c6a9c39433160f69feecee147bdfc0123dc936d869bb4