Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 18:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7399178568161f5a5da8b869e9736716.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7399178568161f5a5da8b869e9736716.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7399178568161f5a5da8b869e9736716.exe
-
Size
10.5MB
-
MD5
7399178568161f5a5da8b869e9736716
-
SHA1
08554ea0af56007bb7d46125db489632f83ef166
-
SHA256
8dfa3d272288ee3e4fdfa6f4c04094dd9e9bc955d62a8dbe99b28b09f35244b8
-
SHA512
44e4b3b7f7b5a83f0ac02b98b62da54a333f12a9400cdfb0765abb26ed35556b3a7da46ba8da4298170e97263bb58eab6fe45249e4293c069c242bd022f4811c
-
SSDEEP
12288:jnWdwQB3a1ZAXYlVR7jbMviJvK3SRL/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/1:jnWdFB3a1ZLlsviJv
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1560 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\rnjcjvsn\ImagePath = "C:\\Windows\\SysWOW64\\rnjcjvsn\\tmameyan.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_7399178568161f5a5da8b869e9736716.exe -
Deletes itself 1 IoCs
pid Process 868 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 tmameyan.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 868 2728 tmameyan.exe 100 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3256 sc.exe 1716 sc.exe 3760 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3460 1312 WerFault.exe 82 3388 2728 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7399178568161f5a5da8b869e9736716.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmameyan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1312 wrote to memory of 224 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 83 PID 1312 wrote to memory of 224 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 83 PID 1312 wrote to memory of 224 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 83 PID 1312 wrote to memory of 3976 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 85 PID 1312 wrote to memory of 3976 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 85 PID 1312 wrote to memory of 3976 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 85 PID 1312 wrote to memory of 3256 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 87 PID 1312 wrote to memory of 3256 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 87 PID 1312 wrote to memory of 3256 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 87 PID 1312 wrote to memory of 1716 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 89 PID 1312 wrote to memory of 1716 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 89 PID 1312 wrote to memory of 1716 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 89 PID 1312 wrote to memory of 3760 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 91 PID 1312 wrote to memory of 3760 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 91 PID 1312 wrote to memory of 3760 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 91 PID 1312 wrote to memory of 1560 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 94 PID 1312 wrote to memory of 1560 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 94 PID 1312 wrote to memory of 1560 1312 JaffaCakes118_7399178568161f5a5da8b869e9736716.exe 94 PID 2728 wrote to memory of 868 2728 tmameyan.exe 100 PID 2728 wrote to memory of 868 2728 tmameyan.exe 100 PID 2728 wrote to memory of 868 2728 tmameyan.exe 100 PID 2728 wrote to memory of 868 2728 tmameyan.exe 100 PID 2728 wrote to memory of 868 2728 tmameyan.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7399178568161f5a5da8b869e9736716.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7399178568161f5a5da8b869e9736716.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rnjcjvsn\2⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tmameyan.exe" C:\Windows\SysWOW64\rnjcjvsn\2⤵
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create rnjcjvsn binPath= "C:\Windows\SysWOW64\rnjcjvsn\tmameyan.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7399178568161f5a5da8b869e9736716.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description rnjcjvsn "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start rnjcjvsn2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 8882⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\rnjcjvsn\tmameyan.exeC:\Windows\SysWOW64\rnjcjvsn\tmameyan.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7399178568161f5a5da8b869e9736716.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 5122⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1312 -ip 13121⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2728 -ip 27281⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.0MB
MD51dde734efa9b1c6fed05323f342484e0
SHA182fd676ecc37365eed8201c01490449ded9b2fbc
SHA256fe6b2d044bc401a1cfc9f5a08be44e3252bb945897b15ad38a94b86efbc8cebe
SHA51283b60e6ade98e9bca8dffe5e0e283bf3ff4453ed9bb9050f2d901fd9f660049cdce48595d8b6c47274001d209f0b23dfae4a85fdce91f80433a2d3a4dee38765