General
-
Target
JaffaCakes118_9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7
-
Size
300KB
-
Sample
241229-rg79bstkbq
-
MD5
182d46a7342ac2a2967195a823d0cece
-
SHA1
482e367a0d778f351ca84513f858f2094c2f6109
-
SHA256
9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7
-
SHA512
dd748ad474bb4868583b975db472b6c353021d1ce05152062e470a12f569b0302158ef155b0f2b7e9cb8ae348e984c73312aaa5408dfb6c9a27efb7e15ebe212
-
SSDEEP
3072:Rp4CdKyMOS7/473DkRVRKTJg50Yq0iQtLU8HHFdDZReYaahHvKhGtij4LyNfKR52:R3QdVRuZYq0ftNzDZReYXhHShGsIyep
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
patmushta.info
parubey.info
Targets
-
-
Target
JaffaCakes118_9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7
-
Size
300KB
-
MD5
182d46a7342ac2a2967195a823d0cece
-
SHA1
482e367a0d778f351ca84513f858f2094c2f6109
-
SHA256
9f87ec93e667df4f14763906163e9e3dee65dd81d4a66f39208d149243caf6e7
-
SHA512
dd748ad474bb4868583b975db472b6c353021d1ce05152062e470a12f569b0302158ef155b0f2b7e9cb8ae348e984c73312aaa5408dfb6c9a27efb7e15ebe212
-
SSDEEP
3072:Rp4CdKyMOS7/473DkRVRKTJg50Yq0iQtLU8HHFdDZReYaahHvKhGtij4LyNfKR52:R3QdVRuZYq0ftNzDZReYXhHShGsIyep
-
Tofsee family
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2