Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 06:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe
-
Size
112KB
-
MD5
633916351d1724c5dee57d31ee60adb6
-
SHA1
fddbffaf67742208cad9036564acdae7520d3390
-
SHA256
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1
-
SHA512
32364dd7dcda32dc3148bc724282fea427494eaa3045096749f68479cd7eb3c2842290cb72b9de0c33965d453cb4792ee17874d6b27f9238cecc2e968afb1977
-
SSDEEP
3072:gjgRyvXEFiKfQ15q4Qe4FVwtwwgs4XBcO4:HRGX4kC1eZ6w
Malware Config
Extracted
tofsee
111.121.193.238
188.190.114.19
103.244.1.233
188.165.132.183
213.155.0.208
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Executes dropped EXE 2 IoCs
pid Process 4156 rahoteij.exe 3024 rahoteij.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\rahoteij.exe\"" JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1944 set thread context of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 4156 set thread context of 3024 4156 rahoteij.exe 88 PID 3024 set thread context of 2180 3024 rahoteij.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 2180 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rahoteij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rahoteij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 4156 rahoteij.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1944 wrote to memory of 1640 1944 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 83 PID 1640 wrote to memory of 4156 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 85 PID 1640 wrote to memory of 4156 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 85 PID 1640 wrote to memory of 4156 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 85 PID 1640 wrote to memory of 444 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 86 PID 1640 wrote to memory of 444 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 86 PID 1640 wrote to memory of 444 1640 JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe 86 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 4156 wrote to memory of 3024 4156 rahoteij.exe 88 PID 3024 wrote to memory of 2180 3024 rahoteij.exe 89 PID 3024 wrote to memory of 2180 3024 rahoteij.exe 89 PID 3024 wrote to memory of 2180 3024 rahoteij.exe 89 PID 3024 wrote to memory of 2180 3024 rahoteij.exe 89 PID 3024 wrote to memory of 2180 3024 rahoteij.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_633916351d1724c5dee57d31ee60adb6.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\rahoteij.exe"C:\Users\Admin\rahoteij.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\rahoteij.exe"C:\Users\Admin\rahoteij.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 3566⤵
- Program crash
PID:3520
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7135.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2180 -ip 21801⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD51ab340cf432c9a87d50563a83c868c00
SHA1883c4e47b5995189d054a224efeb571173b5fc3e
SHA256e8d30c20e1a69b016413c8c34248c7021f803f11bc0a4dc014a72613d784dc3c
SHA512e7289614b333bd64cdc736f9e7b8e2f19e3f62bd00cacda5e5341e53e4959cc76e6cd33a2e00c096d8c50e00a5e9e5d3b58b8fba5f6643bda758949c09e1a0a4
-
Filesize
41.6MB
MD52851f0e2ec867747a77ad9b661aacf8d
SHA1d1502fec7be82fec12b383df97da70628b636548
SHA2561395e3a6909178c96530d7496e74cf5c7a1431bf84f23d975ca00f4fa41f3721
SHA5120f4802216a74f27c8d38fb62d9d90dcd87cf86e42167925b868c3ca8f794ba77c62d0ef8dcf68be4fdb9bf5e0e8d677c3c054f472dda5fd7c12fa495223d98c2