Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe
-
Size
333KB
-
MD5
f53aeee66a0b0dc9cdf6dd537f48287c
-
SHA1
e7e29654829306c7c1633190833d1fe8fc0c44b5
-
SHA256
a3eb89c5fe1e820b0ba694c4aeab1351999630b490d988b4dd698753ab8eb7dc
-
SHA512
6d7a5f77650886803623ae6c3f7aae73a6a4d641b47cbe4707df91d5ed150b55da4a79be0abcdaa4ad2418037579abf966baf451c56eeb41c1a1183916eba04a
-
SSDEEP
6144:/Q41aFOBM9gLaaxfOcWB4KsjKTzcbbyXoAsy6mOnbe3q:o44FuX+axfOcWKhjKncb+vsTmql
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4600 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\apoqhyrs\ImagePath = "C:\\Windows\\SysWOW64\\apoqhyrs\\labhufzy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1420 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
labhufzy.exepid process 3928 labhufzy.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
labhufzy.exedescription pid process target process PID 3928 set thread context of 1420 3928 labhufzy.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2176 sc.exe 2232 sc.exe 3796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2004 4196 WerFault.exe f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe 4428 3928 WerFault.exe labhufzy.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exelabhufzy.exedescription pid process target process PID 4196 wrote to memory of 4420 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 4420 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 4420 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 1016 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 1016 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 1016 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe cmd.exe PID 4196 wrote to memory of 2176 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 2176 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 2176 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 2232 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 2232 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 2232 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 3796 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 3796 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 3796 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe sc.exe PID 4196 wrote to memory of 4600 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 4196 wrote to memory of 4600 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 4196 wrote to memory of 4600 4196 f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe netsh.exe PID 3928 wrote to memory of 1420 3928 labhufzy.exe svchost.exe PID 3928 wrote to memory of 1420 3928 labhufzy.exe svchost.exe PID 3928 wrote to memory of 1420 3928 labhufzy.exe svchost.exe PID 3928 wrote to memory of 1420 3928 labhufzy.exe svchost.exe PID 3928 wrote to memory of 1420 3928 labhufzy.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\apoqhyrs\2⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\labhufzy.exe" C:\Windows\SysWOW64\apoqhyrs\2⤵PID:1016
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create apoqhyrs binPath= "C:\Windows\SysWOW64\apoqhyrs\labhufzy.exe /d\"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2176 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description apoqhyrs "wifi internet conection"2⤵
- Launches sc.exe
PID:2232 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start apoqhyrs2⤵
- Launches sc.exe
PID:3796 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 10522⤵
- Program crash
PID:2004
-
C:\Windows\SysWOW64\apoqhyrs\labhufzy.exeC:\Windows\SysWOW64\apoqhyrs\labhufzy.exe /d"C:\Users\Admin\AppData\Local\Temp\f53aeee66a0b0dc9cdf6dd537f48287c_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 5162⤵
- Program crash
PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4196 -ip 41961⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3928 -ip 39281⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.9MB
MD5f3a4b59bb463453c0aa760d8def80be6
SHA1f94a323ec08ac55be2ac70407ac5a55f9d05477c
SHA2568cb6bcb1142c9e6266edc114239fad53b7a2e6dee6310421a4a56a5468430898
SHA512f17c8d97d3892f113505db75636af48a52abc601848648749946f9c98bceda9844c507c7d2599f8372e34a7ac3b7fd819b80219321b02facb85665a092e6378a