Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe
-
Size
12.3MB
-
MD5
f5dc335c6eb083d57521aff14be3e7c6
-
SHA1
7b1002a0c0ef3916d930c1043c2f060971e27604
-
SHA256
b45ec3d6bc959bc7656fa4825e315d3ad564ec978b1ce173ff57b139f36ce333
-
SHA512
a88e7b4bf9a011c813816018cbaafd9e93a502a6370063b79782c6709637d8a7ddcc04f20f5b74e7d6e4f85f64b2bbfdb8222fd55e0914831736ba49f337c4d0
-
SSDEEP
24576:kgdy5yNM4444444444444444444444444444444444444444444444444444444L:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\eyjzqjdt = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2684 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\eyjzqjdt\ImagePath = "C:\\Windows\\SysWOW64\\eyjzqjdt\\asbjgtfz.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2760 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
asbjgtfz.exepid process 2576 asbjgtfz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
asbjgtfz.exedescription pid process target process PID 2576 set thread context of 2760 2576 asbjgtfz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3020 sc.exe 2564 sc.exe 2672 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exeasbjgtfz.exedescription pid process target process PID 2876 wrote to memory of 3040 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 3040 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 3040 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 3040 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 2616 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 2616 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 2616 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 2616 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe cmd.exe PID 2876 wrote to memory of 3020 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 3020 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 3020 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 3020 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2564 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2564 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2564 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2564 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2672 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2672 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2672 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2672 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe sc.exe PID 2876 wrote to memory of 2684 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe netsh.exe PID 2876 wrote to memory of 2684 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe netsh.exe PID 2876 wrote to memory of 2684 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe netsh.exe PID 2876 wrote to memory of 2684 2876 f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe netsh.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe PID 2576 wrote to memory of 2760 2576 asbjgtfz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\eyjzqjdt\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\asbjgtfz.exe" C:\Windows\SysWOW64\eyjzqjdt\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create eyjzqjdt binPath= "C:\Windows\SysWOW64\eyjzqjdt\asbjgtfz.exe /d\"C:\Users\Admin\AppData\Local\Temp\f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description eyjzqjdt "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start eyjzqjdt2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\eyjzqjdt\asbjgtfz.exeC:\Windows\SysWOW64\eyjzqjdt\asbjgtfz.exe /d"C:\Users\Admin\AppData\Local\Temp\f5dc335c6eb083d57521aff14be3e7c6_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\asbjgtfz.exeFilesize
13.8MB
MD525e8e0c8332c6d99079d158e2c86e2f4
SHA143144022fbd48de8ad8e712b11b1e48b728dd921
SHA256cd5f393f2dc22eff65b1e54d1933b5dc284a76be3f9f3d4ec9de5cc76f421dbc
SHA512da34181d0e89244071ceebdbe918e4cf0520958563675e77f422d19ee39f4bd0515e20b0c9296f9e5a78c02b1ce7ba80979fb3e67874169fafdebb3cf390a14b
-
memory/2576-14-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2576-13-0x0000000000540000-0x0000000000640000-memory.dmpFilesize
1024KB
-
memory/2576-17-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2760-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2760-9-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2760-12-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2760-19-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2760-20-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2760-21-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/2876-4-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2876-3-0x0000000000220000-0x0000000000233000-memory.dmpFilesize
76KB
-
memory/2876-8-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2876-1-0x00000000005C0000-0x00000000006C0000-memory.dmpFilesize
1024KB