Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe
-
Size
13.8MB
-
MD5
edceb005c2a4dbdbd26fbf126afa558e
-
SHA1
2aca159eb26d1a8dd90392866c8cb340ea256969
-
SHA256
bf377f3b66ceadcfa6d4da5f23ee0695063d00da714e6c6b78eae717b8d72b68
-
SHA512
fff9c42708f303774083cd72b0a9bf4d0a62c0bbd10c80e18f21858e129802f651ed69e6e63d903e286c6521d5e1af9ebf123255fe687b0a0e37ecadb87c0726
-
SSDEEP
49152:l1yvllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll:lA
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 688 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\rexjlnso\ImagePath = "C:\\Windows\\SysWOW64\\rexjlnso\\gxfdnipd.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 3012 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 864 gxfdnipd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 3012 864 gxfdnipd.exe 101 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4480 sc.exe 3184 sc.exe 4820 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1856 5076 WerFault.exe 82 1516 864 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4904 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 83 PID 5076 wrote to memory of 4904 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 83 PID 5076 wrote to memory of 4904 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 83 PID 5076 wrote to memory of 3952 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 85 PID 5076 wrote to memory of 3952 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 85 PID 5076 wrote to memory of 3952 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 85 PID 5076 wrote to memory of 4480 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 87 PID 5076 wrote to memory of 4480 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 87 PID 5076 wrote to memory of 4480 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 87 PID 5076 wrote to memory of 3184 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 89 PID 5076 wrote to memory of 3184 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 89 PID 5076 wrote to memory of 3184 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 89 PID 5076 wrote to memory of 4820 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 91 PID 5076 wrote to memory of 4820 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 91 PID 5076 wrote to memory of 4820 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 91 PID 5076 wrote to memory of 688 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 93 PID 5076 wrote to memory of 688 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 93 PID 5076 wrote to memory of 688 5076 edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe 93 PID 864 wrote to memory of 3012 864 gxfdnipd.exe 101 PID 864 wrote to memory of 3012 864 gxfdnipd.exe 101 PID 864 wrote to memory of 3012 864 gxfdnipd.exe 101 PID 864 wrote to memory of 3012 864 gxfdnipd.exe 101 PID 864 wrote to memory of 3012 864 gxfdnipd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rexjlnso\2⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gxfdnipd.exe" C:\Windows\SysWOW64\rexjlnso\2⤵PID:3952
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create rexjlnso binPath= "C:\Windows\SysWOW64\rexjlnso\gxfdnipd.exe /d\"C:\Users\Admin\AppData\Local\Temp\edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4480
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description rexjlnso "wifi internet conection"2⤵
- Launches sc.exe
PID:3184
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start rexjlnso2⤵
- Launches sc.exe
PID:4820
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 10402⤵
- Program crash
PID:1856
-
-
C:\Windows\SysWOW64\rexjlnso\gxfdnipd.exeC:\Windows\SysWOW64\rexjlnso\gxfdnipd.exe /d"C:\Users\Admin\AppData\Local\Temp\edceb005c2a4dbdbd26fbf126afa558e_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 5082⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5076 -ip 50761⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 864 -ip 8641⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.7MB
MD5ff4ffd3a6db60cbb6f5dc1e8064da758
SHA14c8ca7ad37af6d7f132b824d85baf7fb76a016ef
SHA256691c1cfaed8af2bbb1e80dfc3b55935f4919b623602d3db8511a596ebcd53658
SHA51248887b6c02b256d4acc0c687b6411cc97a56bd72a18462a395f76890e2f14c866fd7df73bb1f6f09d35753b8c91802398da1e44057285e421d19ad1667ac0db6