Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe
-
Size
10.1MB
-
MD5
ed8f416c4403957fb730b5d7098a9b38
-
SHA1
a7c0c32bcb36395543ccd093c5d95bd0e4e93121
-
SHA256
014c0a8ffe11dee61e5beb740fbc223168e83ed53fae145e25d1bda0861933c2
-
SHA512
6dc94a0cde76db32fbfb571634ae7084d4333ab99d8ffc2ef7aeed57e8a3c7295417264106856fbd8c6c2714f261ed394a13a5877afabead30c86f5fdcb3a594
-
SSDEEP
49152:2T81MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMc:2T8
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\pwhdndx = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2680 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\pwhdndx\ImagePath = "C:\\Windows\\SysWOW64\\pwhdndx\\yyvqtkbt.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2396 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 yyvqtkbt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2396 2360 yyvqtkbt.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2436 sc.exe 2512 sc.exe 2460 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1936 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 28 PID 1400 wrote to memory of 1936 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 28 PID 1400 wrote to memory of 1936 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 28 PID 1400 wrote to memory of 1936 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2104 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 30 PID 1400 wrote to memory of 2104 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 30 PID 1400 wrote to memory of 2104 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 30 PID 1400 wrote to memory of 2104 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 30 PID 1400 wrote to memory of 2460 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 32 PID 1400 wrote to memory of 2460 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 32 PID 1400 wrote to memory of 2460 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 32 PID 1400 wrote to memory of 2460 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 32 PID 1400 wrote to memory of 2436 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 34 PID 1400 wrote to memory of 2436 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 34 PID 1400 wrote to memory of 2436 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 34 PID 1400 wrote to memory of 2436 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 34 PID 1400 wrote to memory of 2512 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 36 PID 1400 wrote to memory of 2512 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 36 PID 1400 wrote to memory of 2512 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 36 PID 1400 wrote to memory of 2512 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 36 PID 1400 wrote to memory of 2680 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 39 PID 1400 wrote to memory of 2680 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 39 PID 1400 wrote to memory of 2680 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 39 PID 1400 wrote to memory of 2680 1400 ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe 39 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41 PID 2360 wrote to memory of 2396 2360 yyvqtkbt.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pwhdndx\2⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yyvqtkbt.exe" C:\Windows\SysWOW64\pwhdndx\2⤵PID:2104
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pwhdndx binPath= "C:\Windows\SysWOW64\pwhdndx\yyvqtkbt.exe /d\"C:\Users\Admin\AppData\Local\Temp\ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2460
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pwhdndx "wifi internet conection"2⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pwhdndx2⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2680
-
-
C:\Windows\SysWOW64\pwhdndx\yyvqtkbt.exeC:\Windows\SysWOW64\pwhdndx\yyvqtkbt.exe /d"C:\Users\Admin\AppData\Local\Temp\ed8f416c4403957fb730b5d7098a9b38_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.6MB
MD52040df2760b1bc424cee32449d74f485
SHA1626c81daa770c4fabafff59156bcf15d3f0affe5
SHA25605f7c6baccc06e2adde9e769ebac0016c0db7131fdd3b091e38d6301c55ff4bd
SHA5123289722afd770544601768c38f140b769a9dd394072802aceab679b205549146235c4269f210d8c706e6092fabcf2d1ea972ab6e002f3ad801cd9e28a30b0fff