Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 01:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe
-
Size
188KB
-
MD5
12a217a7761bdafc7064f38fe7951c69
-
SHA1
2944bc0be74f3e4773d07c06a278f927aa3bec0d
-
SHA256
40b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29
-
SHA512
606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629
-
SSDEEP
3072:io+8CNt9mSGzkXoDTYjoJ4nQuCs7BOGlW8M/gt3stSMm8:i1z+TYjCevCsd3M8M/Q3sFm8
Malware Config
Extracted
tofsee
91.121.4.118
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe -
Executes dropped EXE 2 IoCs
pid Process 2888 dgrqg.exe 2880 dgrqg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\dgrqg.exe\" /r" JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4444 set thread context of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 2888 set thread context of 2880 2888 dgrqg.exe 85 PID 2880 set thread context of 3596 2880 dgrqg.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4832 3596 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgrqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgrqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 4444 wrote to memory of 1836 4444 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 83 PID 1836 wrote to memory of 2888 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 84 PID 1836 wrote to memory of 2888 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 84 PID 1836 wrote to memory of 2888 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 84 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2888 wrote to memory of 2880 2888 dgrqg.exe 85 PID 2880 wrote to memory of 3596 2880 dgrqg.exe 86 PID 2880 wrote to memory of 3596 2880 dgrqg.exe 86 PID 2880 wrote to memory of 3596 2880 dgrqg.exe 86 PID 2880 wrote to memory of 3596 2880 dgrqg.exe 86 PID 2880 wrote to memory of 3596 2880 dgrqg.exe 86 PID 1836 wrote to memory of 3488 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 90 PID 1836 wrote to memory of 3488 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 90 PID 1836 wrote to memory of 3488 1836 JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12a217a7761bdafc7064f38fe7951c69.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\dgrqg.exe"C:\Users\Admin\dgrqg.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\dgrqg.exe"C:\Users\Admin\dgrqg.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 3206⤵
- Program crash
PID:4832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6733.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3596 -ip 35961⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD5dbe8f4e51df8776502e347a9dbaff4e7
SHA148cb46db5b67bc80e5428672bdcf05c40b44918b
SHA2564af7eabcacfca3f644642cbd7446f1867dce570a13271546b9bf1a88761078f2
SHA512e58ff84fb9e0d2cc3f480fa6d9fb113bcaecf1015888455fcd32fc9820c1c6f70e6d5f191aa58bd4dc7244b2e29d1b3779dc47895e122b7713227b32b3da7ebf
-
Filesize
188KB
MD512a217a7761bdafc7064f38fe7951c69
SHA12944bc0be74f3e4773d07c06a278f927aa3bec0d
SHA25640b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29
SHA512606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629