Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
f27e816769871147e4862997714586f5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f27e816769871147e4862997714586f5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f27e816769871147e4862997714586f5_JaffaCakes118.exe
-
Size
12.7MB
-
MD5
f27e816769871147e4862997714586f5
-
SHA1
6bc7cbca3c705c9da9890a8f4f5d22d273c1105a
-
SHA256
1cb4511945d33d1414e7edf75f28952256df660a4d70e5599d8d0c653a9c44fc
-
SHA512
710979b0bbb44401ae36b4f37d62257c5616317e6a9c66b797f10dc2b7e4f02e39a36cbd54134933c8bf6c528d79926041c66cd418d27b1ed60a9c4e35af364c
-
SSDEEP
24576:qTmCUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUg:9
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3352 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\teichouo\ImagePath = "C:\\Windows\\SysWOW64\\teichouo\\bsovmlpt.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f27e816769871147e4862997714586f5_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation f27e816769871147e4862997714586f5_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3860 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
bsovmlpt.exepid process 2444 bsovmlpt.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bsovmlpt.exedescription pid process target process PID 2444 set thread context of 3860 2444 bsovmlpt.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2748 sc.exe 1884 sc.exe 2368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3980 3728 WerFault.exe f27e816769871147e4862997714586f5_JaffaCakes118.exe 836 2444 WerFault.exe bsovmlpt.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f27e816769871147e4862997714586f5_JaffaCakes118.exebsovmlpt.exedescription pid process target process PID 3728 wrote to memory of 5056 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 5056 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 5056 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 4816 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 4816 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 4816 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe cmd.exe PID 3728 wrote to memory of 2368 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 2368 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 2368 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 2748 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 2748 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 2748 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 1884 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 1884 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 1884 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe sc.exe PID 3728 wrote to memory of 3352 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe netsh.exe PID 3728 wrote to memory of 3352 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe netsh.exe PID 3728 wrote to memory of 3352 3728 f27e816769871147e4862997714586f5_JaffaCakes118.exe netsh.exe PID 2444 wrote to memory of 3860 2444 bsovmlpt.exe svchost.exe PID 2444 wrote to memory of 3860 2444 bsovmlpt.exe svchost.exe PID 2444 wrote to memory of 3860 2444 bsovmlpt.exe svchost.exe PID 2444 wrote to memory of 3860 2444 bsovmlpt.exe svchost.exe PID 2444 wrote to memory of 3860 2444 bsovmlpt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\teichouo\2⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bsovmlpt.exe" C:\Windows\SysWOW64\teichouo\2⤵PID:4816
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create teichouo binPath= "C:\Windows\SysWOW64\teichouo\bsovmlpt.exe /d\"C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2368 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description teichouo "wifi internet conection"2⤵
- Launches sc.exe
PID:2748 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start teichouo2⤵
- Launches sc.exe
PID:1884 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 6442⤵
- Program crash
PID:3980
-
C:\Windows\SysWOW64\teichouo\bsovmlpt.exeC:\Windows\SysWOW64\teichouo\bsovmlpt.exe /d"C:\Users\Admin\AppData\Local\Temp\f27e816769871147e4862997714586f5_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 5082⤵
- Program crash
PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3728 -ip 37281⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2444 -ip 24441⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD57b8119dcb72359cc3f10e908abdf5c8c
SHA1c47a0b7d22d21d1b42288bd581f40c9e674b8330
SHA256e07fbac69955586fd1e923bf50af719de00640048d6ad8ae7c4c6efe7b56ff22
SHA512d8beff771b58fcb9c8e37ca89de7d5007abeba040143572b24c87c030acfe0285c0e14d92565708af765e07ce206b460ca8f21122e04a517f6133049c5bd28e5