Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe
-
Size
14.2MB
-
MD5
f738ea71fba2f31d93643ceea356012b
-
SHA1
c2e376f784dc822841847b899564ec54ed76731c
-
SHA256
8fef051011edd55ad9fc409b8c219c0163ad76e51ccf7de04af425e3c65bcf26
-
SHA512
abd78b9573b6a8dbe7e02fd4ee984eb1a8c4c0c5b8db3997f766e44c52621ab2a54608a0a75754eaa969237704828aa157f7da1eaa2c2cc7ce1c59e8d9edc9b3
-
SSDEEP
196608:wOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOz:
Malware Config
Extracted
tofsee
quadoil.ru
lakeflex.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\qzttoark = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1264 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\qzttoark\ImagePath = "C:\\Windows\\SysWOW64\\qzttoark\\kqloxggb.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 464 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
kqloxggb.exepid process 2244 kqloxggb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kqloxggb.exedescription pid process target process PID 2244 set thread context of 464 2244 kqloxggb.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1416 sc.exe 1272 sc.exe 1532 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exekqloxggb.exedescription pid process target process PID 2228 wrote to memory of 1328 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1328 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1328 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1328 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1204 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1204 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1204 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1204 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe cmd.exe PID 2228 wrote to memory of 1532 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1532 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1532 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1532 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1416 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1416 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1416 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1416 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1272 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1272 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1272 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1272 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe sc.exe PID 2228 wrote to memory of 1264 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe netsh.exe PID 2228 wrote to memory of 1264 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe netsh.exe PID 2228 wrote to memory of 1264 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe netsh.exe PID 2228 wrote to memory of 1264 2228 f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe netsh.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe PID 2244 wrote to memory of 464 2244 kqloxggb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qzttoark\2⤵PID:1328
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kqloxggb.exe" C:\Windows\SysWOW64\qzttoark\2⤵PID:1204
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qzttoark binPath= "C:\Windows\SysWOW64\qzttoark\kqloxggb.exe /d\"C:\Users\Admin\AppData\Local\Temp\f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1532 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qzttoark "wifi internet conection"2⤵
- Launches sc.exe
PID:1416 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qzttoark2⤵
- Launches sc.exe
PID:1272 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1264
-
C:\Windows\SysWOW64\qzttoark\kqloxggb.exeC:\Windows\SysWOW64\qzttoark\kqloxggb.exe /d"C:\Users\Admin\AppData\Local\Temp\f738ea71fba2f31d93643ceea356012b_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD559ce71865386ffa41acdaefae0a661ed
SHA114a4a158d2f52278a9cb4440d6f9326c8d54f51a
SHA256be7d6f798d08ffa0f761ff131988796a58cf6a20aed8d2b63e442f5377de63b7
SHA5121cb0e1ded0722b63ba5f8117aecb6ed0b2a72dbd4bf9ba4b29bd99afbef4b758bb56af73c3391811b7ce5dcfe205065dbf9bdab6146d7a818fc3571dab051b64