Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 19:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe
-
Size
73KB
-
MD5
6f1d008c6d0499aa29a2e2942d362960
-
SHA1
853c07f3cd4823ce6c3e782ca5fa0c3fddeb28c8
-
SHA256
773ed267ba4f811688af03c9a4c9d8acf03be9fab275c40c69986d1658870f59
-
SHA512
dd6a01faf5f6a8e72041ea6b90c1dce38ec996627a77a8f8576431d9e3dbb6db235794e71518903f2e34416f64caf8670306ca2b2ab978b310f4e3211d13b344
-
SSDEEP
1536:gLxnAv2aSRpdNAZNBGa5TsFPChwbaJgX5DHu+/Ou9O39:6+v2TAAa5TEMw+Kzr9O39
Malware Config
Extracted
tofsee
94.242.250.149
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 jkcaaumz.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\jkcaaumz.exe\"" JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 2740 2676 jkcaaumz.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jkcaaumz.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 2676 jkcaaumz.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2676 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 31 PID 2224 wrote to memory of 2676 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 31 PID 2224 wrote to memory of 2676 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 31 PID 2224 wrote to memory of 2676 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 31 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2676 wrote to memory of 2740 2676 jkcaaumz.exe 32 PID 2224 wrote to memory of 2860 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 33 PID 2224 wrote to memory of 2860 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 33 PID 2224 wrote to memory of 2860 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 33 PID 2224 wrote to memory of 2860 2224 JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f1d008c6d0499aa29a2e2942d362960.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\jkcaaumz.exe"C:\Users\Admin\jkcaaumz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7362.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5798258d07f74f761a5283bb3ec33b212
SHA1c39119681e6c803ce8b5c807d5305660f8250def
SHA256b20b4fa12b160966aca10628cebca3bef18e232fc4cefd4070321c12b5aa0b14
SHA512c2e997777f38d88c7009bc249a0fc7a3413dedcbfea39b1ee66ba8e61e1b6b1c99c4acd773c2bc07e5b4aa189b835b88f59272ecd5adfaf156b278594390bbb7
-
Filesize
73KB
MD56f1d008c6d0499aa29a2e2942d362960
SHA1853c07f3cd4823ce6c3e782ca5fa0c3fddeb28c8
SHA256773ed267ba4f811688af03c9a4c9d8acf03be9fab275c40c69986d1658870f59
SHA512dd6a01faf5f6a8e72041ea6b90c1dce38ec996627a77a8f8576431d9e3dbb6db235794e71518903f2e34416f64caf8670306ca2b2ab978b310f4e3211d13b344