Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe
-
Size
10.4MB
-
MD5
f570f71d8285dce6ba5ac8ead17b0435
-
SHA1
ab4efe5cba052b2ba724222540043c90d9d6980c
-
SHA256
62b95f3ef9cdf1e9c528d859c4d4116e114cf90b9711e1bc486ab4d034bd574e
-
SHA512
56034472678e5d6610f1cb9b59f4b3a60c96b281b3fceb529742cdf51ec213c08e16a6b8e1748a06d461ff3d69bf7defdcac8cad10968c64d3c10135093de62f
-
SSDEEP
6144:fpcqzKUTS5Yde/qyQK8ZtqTMIKC/eUPFwUnyaAjLo7pU6eD:PKUO54e/q60tmT7/xPFwVjs7G6
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4940 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\iwteelxh\ImagePath = "C:\\Windows\\SysWOW64\\iwteelxh\\fapzejbz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4212 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
fapzejbz.exepid process 1892 fapzejbz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fapzejbz.exedescription pid process target process PID 1892 set thread context of 4212 1892 fapzejbz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4936 sc.exe 1972 sc.exe 4360 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4676 2184 WerFault.exe f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe 4364 1892 WerFault.exe fapzejbz.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exefapzejbz.exedescription pid process target process PID 2184 wrote to memory of 2260 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2260 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2260 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2672 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2672 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2672 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 4936 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4936 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4936 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 1972 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 1972 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 1972 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4360 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4360 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4360 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe sc.exe PID 2184 wrote to memory of 4940 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe netsh.exe PID 2184 wrote to memory of 4940 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe netsh.exe PID 2184 wrote to memory of 4940 2184 f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe netsh.exe PID 1892 wrote to memory of 4212 1892 fapzejbz.exe svchost.exe PID 1892 wrote to memory of 4212 1892 fapzejbz.exe svchost.exe PID 1892 wrote to memory of 4212 1892 fapzejbz.exe svchost.exe PID 1892 wrote to memory of 4212 1892 fapzejbz.exe svchost.exe PID 1892 wrote to memory of 4212 1892 fapzejbz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\iwteelxh\2⤵PID:2260
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fapzejbz.exe" C:\Windows\SysWOW64\iwteelxh\2⤵PID:2672
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create iwteelxh binPath= "C:\Windows\SysWOW64\iwteelxh\fapzejbz.exe /d\"C:\Users\Admin\AppData\Local\Temp\f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4936 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description iwteelxh "wifi internet conection"2⤵
- Launches sc.exe
PID:1972 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start iwteelxh2⤵
- Launches sc.exe
PID:4360 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 10402⤵
- Program crash
PID:4676
-
C:\Windows\SysWOW64\iwteelxh\fapzejbz.exeC:\Windows\SysWOW64\iwteelxh\fapzejbz.exe /d"C:\Users\Admin\AppData\Local\Temp\f570f71d8285dce6ba5ac8ead17b0435_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 2082⤵
- Program crash
PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2184 -ip 21841⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1892 -ip 18921⤵PID:2732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.6MB
MD5dd5747fe046ed5edd376285f9bba8f32
SHA124a532c22dd4be8aad32fbb841c75a307229154c
SHA25634c5a53fd09cbe7df183f08c1337e40d3d5aecc9cc119f4835b807ef20a9a1d6
SHA51200325748dced28bc0421eb49a881034ebd2c7e4409f3f8f1d4649ee4a097d805f36251b4eaf0f995462f7b149bb7f55fa39600de133d41896ddd201cf8645cf6