Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 11:27
Behavioral task
behavioral1
Sample
f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe
-
Size
13.2MB
-
MD5
f36423b40d7a0bbc75a9d05f0e324e72
-
SHA1
31f80e7d1cea645b288db9835c5e52b23fa103b2
-
SHA256
e0e94c3fafd615c50c084cf4d72bb8f98495ad99ec2408289ae47322748120f7
-
SHA512
fc6118271567c7697b09d7c0ef7acc50cd1867768fd06302533f96b83009c3f7f566813f20f555d628a9d2fc7c9756ca0115f32d534add97c8c66a03ed48b7a7
-
SSDEEP
3072:Fdi8DS3tA2awlaR7/NDzFx2l0oHgBpMKwVTORO2j4UCtXGPjsjmw+V0+V0+V0+V+:a8DiApRRDzFxk0oHOpfws6Uprgp
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4876 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hdehcfwe\ImagePath = "C:\\Windows\\SysWOW64\\hdehcfwe\\omvwfbqm.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 672 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
omvwfbqm.exepid process 2972 omvwfbqm.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\omvwfbqm.exe upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
omvwfbqm.exedescription pid process target process PID 2972 set thread context of 672 2972 omvwfbqm.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3260 sc.exe 4748 sc.exe 4244 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5108 2544 WerFault.exe f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe 2372 2972 WerFault.exe omvwfbqm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exeomvwfbqm.exedescription pid process target process PID 2544 wrote to memory of 3024 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 3024 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 3024 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 4788 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 4788 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 4788 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe cmd.exe PID 2544 wrote to memory of 3260 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 3260 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 3260 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4748 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4748 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4748 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4244 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4244 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4244 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe sc.exe PID 2544 wrote to memory of 4876 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe netsh.exe PID 2544 wrote to memory of 4876 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe netsh.exe PID 2544 wrote to memory of 4876 2544 f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe netsh.exe PID 2972 wrote to memory of 672 2972 omvwfbqm.exe svchost.exe PID 2972 wrote to memory of 672 2972 omvwfbqm.exe svchost.exe PID 2972 wrote to memory of 672 2972 omvwfbqm.exe svchost.exe PID 2972 wrote to memory of 672 2972 omvwfbqm.exe svchost.exe PID 2972 wrote to memory of 672 2972 omvwfbqm.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hdehcfwe\2⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\omvwfbqm.exe" C:\Windows\SysWOW64\hdehcfwe\2⤵PID:4788
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hdehcfwe binPath= "C:\Windows\SysWOW64\hdehcfwe\omvwfbqm.exe /d\"C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3260 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hdehcfwe "wifi internet conection"2⤵
- Launches sc.exe
PID:4748 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hdehcfwe2⤵
- Launches sc.exe
PID:4244 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 11562⤵
- Program crash
PID:5108
-
C:\Windows\SysWOW64\hdehcfwe\omvwfbqm.exeC:\Windows\SysWOW64\hdehcfwe\omvwfbqm.exe /d"C:\Users\Admin\AppData\Local\Temp\f36423b40d7a0bbc75a9d05f0e324e72_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 5362⤵
- Program crash
PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2544 -ip 25441⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2972 -ip 29721⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.0MB
MD58cd216cf4828a28c3929d952feb71c53
SHA123e53f0c5a09e4a24270c857bcd6300b9fc46b58
SHA2563d3c98d46a9290db9f13056aa3d2b17ce1ab655a3ed911606078ad4fd40af6f7
SHA5126541cfed769090edc90d00f5e8db95dffcf2e8cc493fecf1db84b3b5ad365dc818ca4e611d35d75bd61b0e25306055638a2535080f939495912cd64306bc4745