Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 19:49

General

  • Target

    JaffaCakes118_a8d65709b6c6aafab9e360448ce84fd5.exe

  • Size

    10.6MB

  • MD5

    a8d65709b6c6aafab9e360448ce84fd5

  • SHA1

    983680d1f9a85ab0497513062db3a0220bff7c67

  • SHA256

    1fed49beb1c305310c18e449393936b58f59bd9855df4d7c7ca20eb9e7f31a71

  • SHA512

    54af1429968c82b240c9f70e4d4e08fb61fe41c7064f36c86303e776d71efd6f09f5d6ec418bff84d94a2a8132e25bf2adfa2ec0f2e1a645765ebc1a2ecad5b2

  • SSDEEP

    6144:jeaRFeYiZtnsLs/Xyihb124uKPoifbY/3sGIU5N5:jF7/iZtRXpu3ijwf5T

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Windows security bypass 2 TTPs 1 IoCs
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8d65709b6c6aafab9e360448ce84fd5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8d65709b6c6aafab9e360448ce84fd5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nzregir\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2140
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yojvpbfx.exe" C:\Windows\SysWOW64\nzregir\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2708
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create nzregir binPath= "C:\Windows\SysWOW64\nzregir\yojvpbfx.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8d65709b6c6aafab9e360448ce84fd5.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2704
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description nzregir "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2872
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start nzregir
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1800
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2672
  • C:\Windows\SysWOW64\nzregir\yojvpbfx.exe
    C:\Windows\SysWOW64\nzregir\yojvpbfx.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a8d65709b6c6aafab9e360448ce84fd5.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Windows security bypass
      • Sets service image path in registry
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\yojvpbfx.exe

    Filesize

    12.3MB

    MD5

    7e7bf125cff415f82a9876dd63187142

    SHA1

    0a057e794f426fd699340f8f41f40a1876e39ec6

    SHA256

    4ca616cc8a2f1cbfa427ec31453bb74d16c10ba8f9ed2e828956ab2552317499

    SHA512

    c38e44f27cf9792786bacf264f90d9785536efdafa431b65cf2f96c96ff06acecc9c05d8129fb270e9c06563a853e63a15a3e86a0c964282800def1ec921bb02

  • memory/2612-17-0x0000000000400000-0x000000000086B000-memory.dmp

    Filesize

    4.4MB

  • memory/2668-11-0x0000000000080000-0x0000000000095000-memory.dmp

    Filesize

    84KB

  • memory/2668-14-0x0000000000080000-0x0000000000095000-memory.dmp

    Filesize

    84KB

  • memory/2668-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2668-16-0x0000000000080000-0x0000000000095000-memory.dmp

    Filesize

    84KB

  • memory/2668-18-0x0000000000080000-0x0000000000095000-memory.dmp

    Filesize

    84KB

  • memory/3044-4-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3044-10-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3044-9-0x0000000000020000-0x0000000000033000-memory.dmp

    Filesize

    76KB

  • memory/3044-8-0x0000000000400000-0x000000000086B000-memory.dmp

    Filesize

    4.4MB

  • memory/3044-1-0x0000000000980000-0x0000000000A80000-memory.dmp

    Filesize

    1024KB

  • memory/3044-2-0x0000000000020000-0x0000000000033000-memory.dmp

    Filesize

    76KB