Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 15:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe
-
Size
198KB
-
MD5
6413f35ad53a18a8946b8637e00dc10e
-
SHA1
b7d6ba8a2b34365f8e4256d3fb1d95ff7f1c8071
-
SHA256
20fed4724d464893fcfcff65aa0543ad144d525251600ad21003cbdad809a777
-
SHA512
d99ae0228fcb4412bd2968e661453de1aa460a4787c2941661aeb7fcf90321a18b8b6fd99af6f494aac8b995f695b3dd40bc7d4035634fae89bcdd55b846d6b7
-
SSDEEP
3072:haNmy7njLiaxec2ndrUut49Yojngu8KoQM0CIi:UXnd92dbbdf0
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Tofsee family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe -
Executes dropped EXE 2 IoCs
pid Process 100 jcqggrw.exe 1680 jcqggrw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\jcqggrw.exe\" /r" JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4044 set thread context of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 100 set thread context of 1680 100 jcqggrw.exe 85 PID 1680 set thread context of 4448 1680 jcqggrw.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 516 4448 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcqggrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcqggrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 4044 wrote to memory of 536 4044 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 83 PID 536 wrote to memory of 100 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 84 PID 536 wrote to memory of 100 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 84 PID 536 wrote to memory of 100 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 84 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 100 wrote to memory of 1680 100 jcqggrw.exe 85 PID 1680 wrote to memory of 4448 1680 jcqggrw.exe 86 PID 1680 wrote to memory of 4448 1680 jcqggrw.exe 86 PID 1680 wrote to memory of 4448 1680 jcqggrw.exe 86 PID 1680 wrote to memory of 4448 1680 jcqggrw.exe 86 PID 1680 wrote to memory of 4448 1680 jcqggrw.exe 86 PID 536 wrote to memory of 4812 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 90 PID 536 wrote to memory of 4812 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 90 PID 536 wrote to memory of 4812 536 JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6413f35ad53a18a8946b8637e00dc10e.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\jcqggrw.exe"C:\Users\Admin\jcqggrw.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\jcqggrw.exe"C:\Users\Admin\jcqggrw.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 3206⤵
- Program crash
PID:516
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7701.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4448 -ip 44481⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD56d542be04116ccf5f10fc2ad6cf0df2a
SHA1c496bd29980f0d07cc3df53fe738af5e941bb698
SHA256353c0dfa7bacf87a3b7dc90f80a2c3142207e31b82debd57ec37e436b8c1ff9e
SHA512b7dcca2aff4a5ee86b8b0a7e49b2acb73cb047a0908e995712f6f0216d6d2b163123a2470fe56ea675f04d56486d5494aedffbd363c67cc1d80d8d74f3533d56
-
Filesize
198KB
MD56413f35ad53a18a8946b8637e00dc10e
SHA1b7d6ba8a2b34365f8e4256d3fb1d95ff7f1c8071
SHA25620fed4724d464893fcfcff65aa0543ad144d525251600ad21003cbdad809a777
SHA512d99ae0228fcb4412bd2968e661453de1aa460a4787c2941661aeb7fcf90321a18b8b6fd99af6f494aac8b995f695b3dd40bc7d4035634fae89bcdd55b846d6b7