Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
-
Size
10.1MB
-
MD5
bd87e76554e82c653200bfe2c2114355
-
SHA1
e3cce184cef20580e9af902bd49c5caa5fbf0450
-
SHA256
96e67d80d9eca5208f9fe6f5cb977453adac57ac026d4c6b4cd640418911483d
-
SHA512
bd1ebe00cc68a1c16757d1160964dd40a0362f9902244e36b74f41a1322c37fd1c4f7fa9a1767a4a848e3240d8609fd7060ab2f1a313d271748d51e7fb9cdbe4
-
SSDEEP
196608:QhKaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaq:Q
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2580 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\lvchrfv\ImagePath = "C:\\Windows\\SysWOW64\\lvchrfv\\mkzlfbmc.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2460 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 mkzlfbmc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 2460 2968 mkzlfbmc.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2796 sc.exe 2684 sc.exe 2592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2992 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 28 PID 2036 wrote to memory of 2992 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 28 PID 2036 wrote to memory of 2992 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 28 PID 2036 wrote to memory of 2992 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 28 PID 2036 wrote to memory of 2520 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 30 PID 2036 wrote to memory of 2520 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 30 PID 2036 wrote to memory of 2520 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 30 PID 2036 wrote to memory of 2520 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 30 PID 2036 wrote to memory of 2796 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 32 PID 2036 wrote to memory of 2796 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 32 PID 2036 wrote to memory of 2796 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 32 PID 2036 wrote to memory of 2796 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 32 PID 2036 wrote to memory of 2684 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 34 PID 2036 wrote to memory of 2684 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 34 PID 2036 wrote to memory of 2684 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 34 PID 2036 wrote to memory of 2684 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 34 PID 2036 wrote to memory of 2592 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 36 PID 2036 wrote to memory of 2592 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 36 PID 2036 wrote to memory of 2592 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 36 PID 2036 wrote to memory of 2592 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 36 PID 2036 wrote to memory of 2580 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 39 PID 2036 wrote to memory of 2580 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 39 PID 2036 wrote to memory of 2580 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 39 PID 2036 wrote to memory of 2580 2036 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 39 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41 PID 2968 wrote to memory of 2460 2968 mkzlfbmc.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lvchrfv\2⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mkzlfbmc.exe" C:\Windows\SysWOW64\lvchrfv\2⤵PID:2520
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lvchrfv binPath= "C:\Windows\SysWOW64\lvchrfv\mkzlfbmc.exe /d\"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2796
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lvchrfv "wifi internet conection"2⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lvchrfv2⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2580
-
-
C:\Windows\SysWOW64\lvchrfv\mkzlfbmc.exeC:\Windows\SysWOW64\lvchrfv\mkzlfbmc.exe /d"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD5bff8bb2a700631e57a05f373ba6c3935
SHA1e68aa78b10ae7ced34afbfc57375641f4106c29c
SHA256c41503c90647b7b4ecd4b5e3fe85441eeaafca1cdd2fd33b698b7be322b0c3eb
SHA512ebc351b2f6886e4edf3ee4ddf8a3671849ad6ecd245de1c7f0f5fde88b0bae93540fa08bd32f0b96b01b296d2e0c379ca84cf7a117891a7c46201b72f5bfb2c9