Analysis
-
max time kernel
94s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 05:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe
-
Size
189KB
-
MD5
535f97a8b48d7069ba2f6c3441003bd9
-
SHA1
d84624a83e75632a06f4535370b98c56f1d6fa97
-
SHA256
81c12f73122dd4e43b598c5f839f085044192e103281cda5cc8e3b64f4e741eb
-
SHA512
502de5f254cb0e0e3f4e546116074c446cf63d7e82f0d447be53207896c3a3731065d68fc9b024dea7876edcb72abb6cad29d828352af036f6869e9bbf1ebc22
-
SSDEEP
3072:8YI7L+itrYNhtaeMqfGkR+nWSmOhqdYCPd6GFbK+YGa3yU:eGtckR+nWSmOhqdYCPd6GFbK+YGa3yU
Malware Config
Extracted
tofsee
91.121.4.118
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe -
Executes dropped EXE 2 IoCs
pid Process 4640 juke.exe 4600 juke.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\juke.exe\" /r" JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1244 set thread context of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 4640 set thread context of 4600 4640 juke.exe 84 PID 4600 set thread context of 5112 4600 juke.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1732 5112 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juke.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 1244 wrote to memory of 3880 1244 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 81 PID 3880 wrote to memory of 4640 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 83 PID 3880 wrote to memory of 4640 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 83 PID 3880 wrote to memory of 4640 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 83 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4640 wrote to memory of 4600 4640 juke.exe 84 PID 4600 wrote to memory of 5112 4600 juke.exe 85 PID 4600 wrote to memory of 5112 4600 juke.exe 85 PID 4600 wrote to memory of 5112 4600 juke.exe 85 PID 4600 wrote to memory of 5112 4600 juke.exe 85 PID 4600 wrote to memory of 5112 4600 juke.exe 85 PID 3880 wrote to memory of 2136 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 90 PID 3880 wrote to memory of 2136 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 90 PID 3880 wrote to memory of 2136 3880 JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_535f97a8b48d7069ba2f6c3441003bd9.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\juke.exe"C:\Users\Admin\juke.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\juke.exe"C:\Users\Admin\juke.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2006⤵
- Program crash
PID:1732
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4648.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5112 -ip 51121⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD52537bf9239b7390f4978feef0a344925
SHA1da31c4dfa58c7554fc18792d097e43682bfd74e2
SHA256764c3f0867e17c78ace1f938696c47001a763e5bee416285c1c24dcc20528e73
SHA5125aec05e8c1d466ef70dac7a4ee204e1873e1b2924eaadd924108facf3e1b66e5f7a324d2d9bcde39c9ec7560abe56751f8ded85a0af5aeaaac0c709288873add
-
Filesize
189KB
MD5535f97a8b48d7069ba2f6c3441003bd9
SHA1d84624a83e75632a06f4535370b98c56f1d6fa97
SHA25681c12f73122dd4e43b598c5f839f085044192e103281cda5cc8e3b64f4e741eb
SHA512502de5f254cb0e0e3f4e546116074c446cf63d7e82f0d447be53207896c3a3731065d68fc9b024dea7876edcb72abb6cad29d828352af036f6869e9bbf1ebc22