Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 05:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe
-
Size
13.0MB
-
MD5
c06dc6483f2ab9064f7178fd90c2078d
-
SHA1
41d6de655653c97af24ba3330525491c183c30a8
-
SHA256
fbeadcb0b5279e7fce975f8fa2b0bf014b39068553feb774e51ceaf2d86b7215
-
SHA512
d15613202579cf337e31363a4ce33f643fe52509da3b329139b89d3e0e715eb9bae872250c2595232a52dcbc9fa6cc991bcd04ff9e3e7668b6ed5a9d9a49a665
-
SSDEEP
196608:YuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Tofsee family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\vatoqkbr = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2876 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\vatoqkbr\ImagePath = "C:\\Windows\\SysWOW64\\vatoqkbr\\tmhtxmx.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2152 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 tmhtxmx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2152 2804 tmhtxmx.exe 43 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 552 sc.exe 2436 sc.exe 2440 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmhtxmx.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2016 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 30 PID 1796 wrote to memory of 2016 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 30 PID 1796 wrote to memory of 2016 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 30 PID 1796 wrote to memory of 2016 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 30 PID 1796 wrote to memory of 1932 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 32 PID 1796 wrote to memory of 1932 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 32 PID 1796 wrote to memory of 1932 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 32 PID 1796 wrote to memory of 1932 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 32 PID 1796 wrote to memory of 552 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 34 PID 1796 wrote to memory of 552 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 34 PID 1796 wrote to memory of 552 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 34 PID 1796 wrote to memory of 552 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 34 PID 1796 wrote to memory of 2436 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 36 PID 1796 wrote to memory of 2436 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 36 PID 1796 wrote to memory of 2436 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 36 PID 1796 wrote to memory of 2436 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 36 PID 1796 wrote to memory of 2440 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 38 PID 1796 wrote to memory of 2440 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 38 PID 1796 wrote to memory of 2440 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 38 PID 1796 wrote to memory of 2440 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 38 PID 1796 wrote to memory of 2876 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 41 PID 1796 wrote to memory of 2876 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 41 PID 1796 wrote to memory of 2876 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 41 PID 1796 wrote to memory of 2876 1796 JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe 41 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43 PID 2804 wrote to memory of 2152 2804 tmhtxmx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vatoqkbr\2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tmhtxmx.exe" C:\Windows\SysWOW64\vatoqkbr\2⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vatoqkbr binPath= "C:\Windows\SysWOW64\vatoqkbr\tmhtxmx.exe /d\"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vatoqkbr "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vatoqkbr2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\vatoqkbr\tmhtxmx.exeC:\Windows\SysWOW64\vatoqkbr\tmhtxmx.exe /d"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD5f1efeca75db50b9dc857b3cbf53ee95a
SHA1477aa2c070c8793ad2bfd6761ceeb90cda136368
SHA256a57fe3e44016a803ac469ba4fb12ddf8017ebf9b4f44aa18c4f8bcb77c36bd55
SHA5127d021bee364c128a6ffa3e8358a4c241b94e76e21256223ca20d32b4fdd9a92ecb008b427edfcacb69ddb161af498ead900d51d9e0cea58fffaebbd3c9a3455d