Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 06:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe
-
Size
144KB
-
MD5
633a5b3f5abc1123356f2c859bcb8e50
-
SHA1
da720c363b880dbc5623e9584b62523fb4fba909
-
SHA256
35e7dacaff1f83266879f8c1b8b87094b9afe181b397b3927561c74844e38d18
-
SHA512
9fb9e0aa1b2d263e7eec9b065c1af0e5a72ec68f9c4cfa27a3bd46d259f1416f5c60a82cf01e80cdddeddb1463569fb5981fb36d000c8e0ffdfd20af1f353c8e
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGqXJ:uaGoEpWxSbGqZ
Malware Config
Extracted
tofsee
91.218.39.211
188.130.237.44
91.204.162.103
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 yzrppjbo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\yzrppjbo.exe\"" JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2828 set thread context of 1280 2828 yzrppjbo.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2752 1280 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzrppjbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2828 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 83 PID 2140 wrote to memory of 2828 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 83 PID 2140 wrote to memory of 2828 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 83 PID 2828 wrote to memory of 1280 2828 yzrppjbo.exe 84 PID 2828 wrote to memory of 1280 2828 yzrppjbo.exe 84 PID 2828 wrote to memory of 1280 2828 yzrppjbo.exe 84 PID 2828 wrote to memory of 1280 2828 yzrppjbo.exe 84 PID 2828 wrote to memory of 1280 2828 yzrppjbo.exe 84 PID 2140 wrote to memory of 1600 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 86 PID 2140 wrote to memory of 1600 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 86 PID 2140 wrote to memory of 1600 2140 JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633a5b3f5abc1123356f2c859bcb8e50.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\yzrppjbo.exe"C:\Users\Admin\yzrppjbo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 3564⤵
- Program crash
PID:2752
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7053.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1280 -ip 12801⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5658a7261d5f5a3086abfeb116c73b6ee
SHA1747a782634d64aea1819f59c90419b3c0df4c298
SHA25685f8a28db4ca2f97df0601afadec84f4c84b3dc2c1a6ba45c326aa109658de5b
SHA512979cfc269d12a4a663adf1f5d9d54206f42e10feff148c7656952f30f6954835ed7ff13a639e88858cc42904cef9cbb51d4deedc9dd622c234672e31fa3d6896
-
Filesize
36.7MB
MD57fffe56dda7c87d2cf2b8e10dd4ae1e6
SHA103b1450424f54196a346de3b690ffb1cd6bdb568
SHA256c358f209185f55d46badd255331d2c2ae0c63bf7cc35c384b08aeaa6425160c8
SHA512bd0ffa311d5c82a98cba78115adfec4142480565d4bda5130620f88b8566e35c7508d9f5fe4079083f78c3c31b97e0ed3c9ccc67a4ad78b075882f48ac33a24f