Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe
-
Size
10.1MB
-
MD5
bd87e76554e82c653200bfe2c2114355
-
SHA1
e3cce184cef20580e9af902bd49c5caa5fbf0450
-
SHA256
96e67d80d9eca5208f9fe6f5cb977453adac57ac026d4c6b4cd640418911483d
-
SHA512
bd1ebe00cc68a1c16757d1160964dd40a0362f9902244e36b74f41a1322c37fd1c4f7fa9a1767a4a848e3240d8609fd7060ab2f1a313d271748d51e7fb9cdbe4
-
SSDEEP
196608:QhKaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaq:Q
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5080 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qmgxhlc\ImagePath = "C:\\Windows\\SysWOW64\\qmgxhlc\\kzmiutmy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4056 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 380 kzmiutmy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 380 set thread context of 4056 380 kzmiutmy.exe 102 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2604 sc.exe 2124 sc.exe 4328 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4972 4556 WerFault.exe 85 2464 380 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4556 wrote to memory of 5112 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 86 PID 4556 wrote to memory of 5112 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 86 PID 4556 wrote to memory of 5112 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 86 PID 4556 wrote to memory of 3704 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 88 PID 4556 wrote to memory of 3704 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 88 PID 4556 wrote to memory of 3704 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 88 PID 4556 wrote to memory of 2604 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 90 PID 4556 wrote to memory of 2604 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 90 PID 4556 wrote to memory of 2604 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 90 PID 4556 wrote to memory of 2124 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 92 PID 4556 wrote to memory of 2124 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 92 PID 4556 wrote to memory of 2124 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 92 PID 4556 wrote to memory of 4328 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 94 PID 4556 wrote to memory of 4328 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 94 PID 4556 wrote to memory of 4328 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 94 PID 4556 wrote to memory of 5080 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 97 PID 4556 wrote to memory of 5080 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 97 PID 4556 wrote to memory of 5080 4556 bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe 97 PID 380 wrote to memory of 4056 380 kzmiutmy.exe 102 PID 380 wrote to memory of 4056 380 kzmiutmy.exe 102 PID 380 wrote to memory of 4056 380 kzmiutmy.exe 102 PID 380 wrote to memory of 4056 380 kzmiutmy.exe 102 PID 380 wrote to memory of 4056 380 kzmiutmy.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qmgxhlc\2⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kzmiutmy.exe" C:\Windows\SysWOW64\qmgxhlc\2⤵PID:3704
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qmgxhlc binPath= "C:\Windows\SysWOW64\qmgxhlc\kzmiutmy.exe /d\"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qmgxhlc "wifi internet conection"2⤵
- Launches sc.exe
PID:2124
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qmgxhlc2⤵
- Launches sc.exe
PID:4328
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12082⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\qmgxhlc\kzmiutmy.exeC:\Windows\SysWOW64\qmgxhlc\kzmiutmy.exe /d"C:\Users\Admin\AppData\Local\Temp\bd87e76554e82c653200bfe2c2114355_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 5122⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 380 -ip 3801⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.2MB
MD575ab93bdf8916858498682626fe8359f
SHA106a0e7a9d6f6658a66204979eceb64fdc2b4105c
SHA2566c7a4b7c78b6f8898f6082fd7a07c358da87f4949edb739ce8ecf549cf306093
SHA512bb9b527dbaa5653f18784dbc2fd633232a0a8e10dc01bcb6ba35e953164939d0bb9d7cb5bb4b743be569b62607185193303b6c1a0e962dbc68678df745a118e5