Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
-
Size
112KB
-
MD5
633916351d1724c5dee57d31ee60adb6
-
SHA1
fddbffaf67742208cad9036564acdae7520d3390
-
SHA256
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1
-
SHA512
32364dd7dcda32dc3148bc724282fea427494eaa3045096749f68479cd7eb3c2842290cb72b9de0c33965d453cb4792ee17874d6b27f9238cecc2e968afb1977
-
SSDEEP
3072:gjgRyvXEFiKfQ15q4Qe4FVwtwwgs4XBcO4:HRGX4kC1eZ6w
Malware Config
Extracted
tofsee
111.121.193.238
188.190.114.19
103.244.1.233
188.165.132.183
213.155.0.208
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 yhovalpq.exe 2612 yhovalpq.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\yhovalpq.exe\"" JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1680 set thread context of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 2336 set thread context of 2612 2336 yhovalpq.exe 34 PID 2612 set thread context of 2768 2612 yhovalpq.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhovalpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhovalpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 2336 yhovalpq.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 1680 wrote to memory of 3020 1680 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 30 PID 3020 wrote to memory of 2336 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 31 PID 3020 wrote to memory of 2336 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 31 PID 3020 wrote to memory of 2336 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 31 PID 3020 wrote to memory of 2336 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 31 PID 3020 wrote to memory of 2752 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 32 PID 3020 wrote to memory of 2752 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 32 PID 3020 wrote to memory of 2752 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 32 PID 3020 wrote to memory of 2752 3020 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 32 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2336 wrote to memory of 2612 2336 yhovalpq.exe 34 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35 PID 2612 wrote to memory of 2768 2612 yhovalpq.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\yhovalpq.exe"C:\Users\Admin\yhovalpq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\yhovalpq.exe"C:\Users\Admin\yhovalpq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3844.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD51ab340cf432c9a87d50563a83c868c00
SHA1883c4e47b5995189d054a224efeb571173b5fc3e
SHA256e8d30c20e1a69b016413c8c34248c7021f803f11bc0a4dc014a72613d784dc3c
SHA512e7289614b333bd64cdc736f9e7b8e2f19e3f62bd00cacda5e5341e53e4959cc76e6cd33a2e00c096d8c50e00a5e9e5d3b58b8fba5f6643bda758949c09e1a0a4
-
Filesize
33.2MB
MD520324640d54f11607855fad7a90ec646
SHA1407a39601a9052e38551d76b52b1ec493bcbb6e9
SHA2560c1cf6a84219f3500be8a89860446009955a64fbb6fde443939bcf08ac28a3a2
SHA512d49bd3937863ef9788e990a85e7d78ef15c6a1079b25e47892628ab5430ff5684f05071b9380d01d8dbb8174e4ca58c4b82fc27aeb76060a97a52285a5bf753f