Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
f8f833d107384d641da35abab88050e3_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f8f833d107384d641da35abab88050e3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f8f833d107384d641da35abab88050e3_JaffaCakes118.exe
-
Size
11.5MB
-
MD5
f8f833d107384d641da35abab88050e3
-
SHA1
95d740f7606d93ed86a451a8fbdcec91c0c94bf7
-
SHA256
46c423ab1e4f0347a402ae2c5a6c90cbf9948ec408502fd3a5f585495dc632ac
-
SHA512
267268cdd2ddc721c3c830c7935bcf78791d84308ea41df227382c186c3b43c83608407aa9bc039895cda04013a120d0bbc623ccc812e7d11640c0155e719e7c
-
SSDEEP
24576:jT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRv:dp+
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2264 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\lvaafjqi\ImagePath = "C:\\Windows\\SysWOW64\\lvaafjqi\\zrzowuyw.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f8f833d107384d641da35abab88050e3_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation f8f833d107384d641da35abab88050e3_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 5012 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
zrzowuyw.exepid process 2348 zrzowuyw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zrzowuyw.exedescription pid process target process PID 2348 set thread context of 5012 2348 zrzowuyw.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 624 sc.exe 4676 sc.exe 4692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f8f833d107384d641da35abab88050e3_JaffaCakes118.exezrzowuyw.exedescription pid process target process PID 1932 wrote to memory of 4908 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 4908 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 4908 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 1216 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 1216 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 1216 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 624 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 624 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 624 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4676 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4676 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4676 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4692 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4692 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 4692 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe sc.exe PID 1932 wrote to memory of 2264 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe netsh.exe PID 1932 wrote to memory of 2264 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe netsh.exe PID 1932 wrote to memory of 2264 1932 f8f833d107384d641da35abab88050e3_JaffaCakes118.exe netsh.exe PID 2348 wrote to memory of 5012 2348 zrzowuyw.exe svchost.exe PID 2348 wrote to memory of 5012 2348 zrzowuyw.exe svchost.exe PID 2348 wrote to memory of 5012 2348 zrzowuyw.exe svchost.exe PID 2348 wrote to memory of 5012 2348 zrzowuyw.exe svchost.exe PID 2348 wrote to memory of 5012 2348 zrzowuyw.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f833d107384d641da35abab88050e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8f833d107384d641da35abab88050e3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lvaafjqi\2⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zrzowuyw.exe" C:\Windows\SysWOW64\lvaafjqi\2⤵PID:1216
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lvaafjqi binPath= "C:\Windows\SysWOW64\lvaafjqi\zrzowuyw.exe /d\"C:\Users\Admin\AppData\Local\Temp\f8f833d107384d641da35abab88050e3_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:624 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lvaafjqi "wifi internet conection"2⤵
- Launches sc.exe
PID:4676 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lvaafjqi2⤵
- Launches sc.exe
PID:4692 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2264
-
C:\Windows\SysWOW64\lvaafjqi\zrzowuyw.exeC:\Windows\SysWOW64\lvaafjqi\zrzowuyw.exe /d"C:\Users\Admin\AppData\Local\Temp\f8f833d107384d641da35abab88050e3_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:5012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD549db012d48aecaff1240bee6892339be
SHA1284042ffcf175a3a3f9f59815c4563bff0a21448
SHA25676b9093a0f89ad53a595c43ebf28d135da1c6dffb363653b7f7302947f873d7b
SHA512e8aaaaf6bbc2d81a056fb4d56a063a0204012bd253cc3683d2e02a7681e0153d0768c0a5752bc166112a396c488920625eb57e23388657f907f8b02a38364d86