Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 20:05

General

  • Target

    JaffaCakes118_bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac.exe

  • Size

    254KB

  • MD5

    3e043f2612e852802ff985d954946303

  • SHA1

    f930345bf9605d7c343067c234b5985eec755aff

  • SHA256

    bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac

  • SHA512

    eb7be1f0017628ad12a9f5d37c38d2cbc10f9f5c62a031b669b39fa8118e43dfd0358ace83e94d6b7159c705d32f4c5f8814cde0489a33895528fca158708956

  • SSDEEP

    3072:N0Op87yjsXyye+S0k3Ge2NnU5Z4mBwFkASvIlPfcRjOIqvMRbY8YhVccii+duBpp:dEyh2eV4mkkASgNajOILRsN/ccngHR

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\yzmuwgxp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zayileju.exe" C:\Windows\SysWOW64\yzmuwgxp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3388
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create yzmuwgxp binPath= "C:\Windows\SysWOW64\yzmuwgxp\zayileju.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4844
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description yzmuwgxp "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2344
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start yzmuwgxp
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4292
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 1124
      2⤵
      • Program crash
      PID:3652
  • C:\Windows\SysWOW64\yzmuwgxp\zayileju.exe
    C:\Windows\SysWOW64\yzmuwgxp\zayileju.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcab11e14d281232fd89ecbd980282470b5d7c451ed76f0d6bb5509991c176ac.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Sets service image path in registry
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:4564
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 516
      2⤵
      • Program crash
      PID:1364
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 592 -ip 592
    1⤵
      PID:212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4316 -ip 4316
      1⤵
        PID:4244

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\zayileju.exe

        Filesize

        11.9MB

        MD5

        099ac0485e972c7e65955c6896e06597

        SHA1

        9efde20cb41cb1a3ed77f3069821de23e0c2d44b

        SHA256

        d4fb17c8f5a66931b9679cfd0aa28f2a219b533e93397428483ea49971d11e36

        SHA512

        d3cd7bde669e068c52b67872bceea4f2f610cc8a90e6941c578900f24c5b287d3e7ddcdcd441e01b1c284430e8de01e3d2051910fbac4b5f2a0cc97c61ba7614

      • memory/592-1-0x0000000001180000-0x0000000001280000-memory.dmp

        Filesize

        1024KB

      • memory/592-2-0x0000000001130000-0x0000000001143000-memory.dmp

        Filesize

        76KB

      • memory/592-3-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/592-7-0x0000000000400000-0x0000000001085000-memory.dmp

        Filesize

        12.5MB

      • memory/592-9-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/592-8-0x0000000001130000-0x0000000001143000-memory.dmp

        Filesize

        76KB

      • memory/4316-15-0x0000000000400000-0x0000000001085000-memory.dmp

        Filesize

        12.5MB

      • memory/4564-13-0x0000000000C20000-0x0000000000C35000-memory.dmp

        Filesize

        84KB

      • memory/4564-11-0x0000000000C20000-0x0000000000C35000-memory.dmp

        Filesize

        84KB

      • memory/4564-14-0x0000000000C20000-0x0000000000C35000-memory.dmp

        Filesize

        84KB