Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
-
Size
333KB
-
MD5
f53aeee66a0b0dc9cdf6dd537f48287c
-
SHA1
e7e29654829306c7c1633190833d1fe8fc0c44b5
-
SHA256
a3eb89c5fe1e820b0ba694c4aeab1351999630b490d988b4dd698753ab8eb7dc
-
SHA512
6d7a5f77650886803623ae6c3f7aae73a6a4d641b47cbe4707df91d5ed150b55da4a79be0abcdaa4ad2418037579abf966baf451c56eeb41c1a1183916eba04a
-
SSDEEP
6144:/Q41aFOBM9gLaaxfOcWB4KsjKTzcbbyXoAsy6mOnbe3q:o44FuX+axfOcWKhjKncb+vsTmql
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\jfvltmyb = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2200 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\jfvltmyb\ImagePath = "C:\\Windows\\SysWOW64\\jfvltmyb\\obkhinzm.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2480 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
obkhinzm.exepid process 2428 obkhinzm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
obkhinzm.exedescription pid process target process PID 2428 set thread context of 2480 2428 obkhinzm.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2624 sc.exe 2412 sc.exe 2524 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exeobkhinzm.exedescription pid process target process PID 2904 wrote to memory of 2940 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2940 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2940 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2940 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2972 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2972 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2972 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2972 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 2904 wrote to memory of 2624 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2624 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2624 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2624 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2412 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2412 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2412 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2412 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2524 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2524 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2524 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2524 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 2904 wrote to memory of 2200 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 2904 wrote to memory of 2200 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 2904 wrote to memory of 2200 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 2904 wrote to memory of 2200 2904 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe PID 2428 wrote to memory of 2480 2428 obkhinzm.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jfvltmyb\2⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\obkhinzm.exe" C:\Windows\SysWOW64\jfvltmyb\2⤵PID:2972
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jfvltmyb binPath= "C:\Windows\SysWOW64\jfvltmyb\obkhinzm.exe /d\"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2624 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jfvltmyb "wifi internet conection"2⤵
- Launches sc.exe
PID:2412 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jfvltmyb2⤵
- Launches sc.exe
PID:2524 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2200
-
C:\Windows\SysWOW64\jfvltmyb\obkhinzm.exeC:\Windows\SysWOW64\jfvltmyb\obkhinzm.exe /d"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2480
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD595c87bbc81167289b252b349eb3c732a
SHA139daf173cdc5f6289c07e7c3d33842f1244d3590
SHA256da66911a23c53304583fa3ae8a64237b75d8db2914d6da942499e82f2f29afb9
SHA512f165f90298acaf1210086234e1425fb8ede9bcab0c34fc82c927e82f5b435cdb67a67d1d4f23be1eea0c01cffaebc841102679eb66e7c97e678113545adc5947