Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 15:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
-
Size
198KB
-
MD5
6413f35ad53a18a8946b8637e00dc10e
-
SHA1
b7d6ba8a2b34365f8e4256d3fb1d95ff7f1c8071
-
SHA256
20fed4724d464893fcfcff65aa0543ad144d525251600ad21003cbdad809a777
-
SHA512
d99ae0228fcb4412bd2968e661453de1aa460a4787c2941661aeb7fcf90321a18b8b6fd99af6f494aac8b995f695b3dd40bc7d4035634fae89bcdd55b846d6b7
-
SSDEEP
3072:haNmy7njLiaxec2ndrUut49Yojngu8KoQM0CIi:UXnd92dbbdf0
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Deletes itself 1 IoCs
pid Process 2848 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 hgf.exe 2700 hgf.exe -
Loads dropped DLL 3 IoCs
pid Process 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 2880 hgf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\hgf.exe\" /r" JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1932 set thread context of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 2880 set thread context of 2700 2880 hgf.exe 35 PID 2700 set thread context of 2988 2700 hgf.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgf.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 1932 wrote to memory of 2052 1932 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 31 PID 2052 wrote to memory of 2880 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 32 PID 2052 wrote to memory of 2880 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 32 PID 2052 wrote to memory of 2880 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 32 PID 2052 wrote to memory of 2880 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 32 PID 2052 wrote to memory of 2848 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 33 PID 2052 wrote to memory of 2848 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 33 PID 2052 wrote to memory of 2848 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 33 PID 2052 wrote to memory of 2848 2052 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 33 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2880 wrote to memory of 2700 2880 hgf.exe 35 PID 2700 wrote to memory of 2988 2700 hgf.exe 36 PID 2700 wrote to memory of 2988 2700 hgf.exe 36 PID 2700 wrote to memory of 2988 2700 hgf.exe 36 PID 2700 wrote to memory of 2988 2700 hgf.exe 36 PID 2700 wrote to memory of 2988 2700 hgf.exe 36 PID 2700 wrote to memory of 2988 2700 hgf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\hgf.exe"C:\Users\Admin\hgf.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\hgf.exe"C:\Users\Admin\hgf.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0670.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD56d542be04116ccf5f10fc2ad6cf0df2a
SHA1c496bd29980f0d07cc3df53fe738af5e941bb698
SHA256353c0dfa7bacf87a3b7dc90f80a2c3142207e31b82debd57ec37e436b8c1ff9e
SHA512b7dcca2aff4a5ee86b8b0a7e49b2acb73cb047a0908e995712f6f0216d6d2b163123a2470fe56ea675f04d56486d5494aedffbd363c67cc1d80d8d74f3533d56
-
Filesize
198KB
MD56413f35ad53a18a8946b8637e00dc10e
SHA1b7d6ba8a2b34365f8e4256d3fb1d95ff7f1c8071
SHA25620fed4724d464893fcfcff65aa0543ad144d525251600ad21003cbdad809a777
SHA512d99ae0228fcb4412bd2968e661453de1aa460a4787c2941661aeb7fcf90321a18b8b6fd99af6f494aac8b995f695b3dd40bc7d4035634fae89bcdd55b846d6b7