Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 05:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
-
Size
189KB
-
MD5
535f97a8b48d7069ba2f6c3441003bd9
-
SHA1
d84624a83e75632a06f4535370b98c56f1d6fa97
-
SHA256
81c12f73122dd4e43b598c5f839f085044192e103281cda5cc8e3b64f4e741eb
-
SHA512
502de5f254cb0e0e3f4e546116074c446cf63d7e82f0d447be53207896c3a3731065d68fc9b024dea7876edcb72abb6cad29d828352af036f6869e9bbf1ebc22
-
SSDEEP
3072:8YI7L+itrYNhtaeMqfGkR+nWSmOhqdYCPd6GFbK+YGa3yU:eGtckR+nWSmOhqdYCPd6GFbK+YGa3yU
Malware Config
Extracted
tofsee
91.121.4.118
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 1492 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2564 ghryv.exe 2780 ghryv.exe -
Loads dropped DLL 3 IoCs
pid Process 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 2564 ghryv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ghryv.exe\" /r" JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2736 set thread context of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2564 set thread context of 2780 2564 ghryv.exe 32 PID 2780 set thread context of 2568 2780 ghryv.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghryv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghryv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2736 wrote to memory of 2748 2736 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 30 PID 2748 wrote to memory of 2564 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 31 PID 2748 wrote to memory of 2564 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 31 PID 2748 wrote to memory of 2564 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 31 PID 2748 wrote to memory of 2564 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 31 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2564 wrote to memory of 2780 2564 ghryv.exe 32 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2780 wrote to memory of 2568 2780 ghryv.exe 33 PID 2748 wrote to memory of 1492 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 34 PID 2748 wrote to memory of 1492 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 34 PID 2748 wrote to memory of 1492 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 34 PID 2748 wrote to memory of 1492 2748 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\ghryv.exe"C:\Users\Admin\ghryv.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\ghryv.exe"C:\Users\Admin\ghryv.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3366.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD52537bf9239b7390f4978feef0a344925
SHA1da31c4dfa58c7554fc18792d097e43682bfd74e2
SHA256764c3f0867e17c78ace1f938696c47001a763e5bee416285c1c24dcc20528e73
SHA5125aec05e8c1d466ef70dac7a4ee204e1873e1b2924eaadd924108facf3e1b66e5f7a324d2d9bcde39c9ec7560abe56751f8ded85a0af5aeaaac0c709288873add
-
Filesize
189KB
MD5535f97a8b48d7069ba2f6c3441003bd9
SHA1d84624a83e75632a06f4535370b98c56f1d6fa97
SHA25681c12f73122dd4e43b598c5f839f085044192e103281cda5cc8e3b64f4e741eb
SHA512502de5f254cb0e0e3f4e546116074c446cf63d7e82f0d447be53207896c3a3731065d68fc9b024dea7876edcb72abb6cad29d828352af036f6869e9bbf1ebc22