Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 19:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe
-
Size
117KB
-
MD5
6f27190edb3775f165617d13e32e3e90
-
SHA1
66bc0f60853a9b20ee761c09ae6f5af5a480b8ec
-
SHA256
b24a82191df95eaffd79dc0e4f7eac91c48cb7e37ade114c29218aef038ee6e3
-
SHA512
9ad1671828a155b7a9af9f7796cb4b632bb9249849107ac109ff778e99e232687b2b5f41f26e8f5811783632e11bdaa1e237b22fcd824315f915128e0c9664b2
-
SSDEEP
1536:MKxS+iac/mX84H4VG6AO4kRd+3j6VPvTW1YLakyPzk0O64Y3V:MZ+iZ/mX8UaG6SF3+VnpakyPzkXu
Malware Config
Extracted
tofsee
94.242.250.149
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2548 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 uhmzerks.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\uhmzerks.exe\"" JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 2920 2492 uhmzerks.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhmzerks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 2492 uhmzerks.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2492 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 30 PID 2932 wrote to memory of 2492 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 30 PID 2932 wrote to memory of 2492 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 30 PID 2932 wrote to memory of 2492 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 30 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2492 wrote to memory of 2920 2492 uhmzerks.exe 31 PID 2932 wrote to memory of 2548 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 32 PID 2932 wrote to memory of 2548 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 32 PID 2932 wrote to memory of 2548 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 32 PID 2932 wrote to memory of 2548 2932 JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6f27190edb3775f165617d13e32e3e90.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\uhmzerks.exe"C:\Users\Admin\uhmzerks.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0724.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5704f84c3bc24181fa20e286125b38fc6
SHA16769cbb2b26e93c8acb4af7749f7feb3da003a0d
SHA2567e48caee06c2b897ef8375cdb98d88eabe5520ac4ccf862af54f51db647d7097
SHA51261d2551a1dc448d53b69b99c91f0b3c0e6bc636d0dfa0d5b3252b07bb9460ddc300f406450ba1a786ea88e9aa6a06111627a22c42e1d543d17058cc3e70485b9
-
Filesize
34.0MB
MD57814992b83dff494f64e39c6016a28e5
SHA11d447868f87d34028284b8ff4d870afcb8ca55c1
SHA256b9a718f0a6d568b854c85d1d8ecbd8c7cbe8a0efa20bc97abca7962f31ac5395
SHA51285378bedc6c320c7b837e97dd9f27fb50a12a0d7b957c61eaf682fba867a85f318d24ed1f986214a187af8147488e15e5f2cdb703eadcbac66e53391caa85394