Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 01:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
-
Size
188KB
-
MD5
12a217a7761bdafc7064f38fe7951c69
-
SHA1
2944bc0be74f3e4773d07c06a278f927aa3bec0d
-
SHA256
40b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29
-
SHA512
606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629
-
SSDEEP
3072:io+8CNt9mSGzkXoDTYjoJ4nQuCs7BOGlW8M/gt3stSMm8:i1z+TYjCevCsd3M8M/Q3sFm8
Malware Config
Extracted
tofsee
91.121.4.118
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2524 ksebyx.exe 1716 ksebyx.exe -
Loads dropped DLL 3 IoCs
pid Process 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 2524 ksebyx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ksebyx.exe\" /r" JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2092 set thread context of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2524 set thread context of 1716 2524 ksebyx.exe 32 PID 1716 set thread context of 2892 1716 ksebyx.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksebyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksebyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2092 wrote to memory of 2400 2092 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 30 PID 2400 wrote to memory of 2524 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 31 PID 2400 wrote to memory of 2524 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 31 PID 2400 wrote to memory of 2524 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 31 PID 2400 wrote to memory of 2524 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 31 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 2524 wrote to memory of 1716 2524 ksebyx.exe 32 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 1716 wrote to memory of 2892 1716 ksebyx.exe 33 PID 2400 wrote to memory of 2644 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 34 PID 2400 wrote to memory of 2644 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 34 PID 2400 wrote to memory of 2644 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 34 PID 2400 wrote to memory of 2644 2400 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\ksebyx.exe"C:\Users\Admin\ksebyx.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\ksebyx.exe"C:\Users\Admin\ksebyx.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7721.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5dbe8f4e51df8776502e347a9dbaff4e7
SHA148cb46db5b67bc80e5428672bdcf05c40b44918b
SHA2564af7eabcacfca3f644642cbd7446f1867dce570a13271546b9bf1a88761078f2
SHA512e58ff84fb9e0d2cc3f480fa6d9fb113bcaecf1015888455fcd32fc9820c1c6f70e6d5f191aa58bd4dc7244b2e29d1b3779dc47895e122b7713227b32b3da7ebf
-
Filesize
188KB
MD512a217a7761bdafc7064f38fe7951c69
SHA12944bc0be74f3e4773d07c06a278f927aa3bec0d
SHA25640b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29
SHA512606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629