Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe
-
Size
11.3MB
-
MD5
f7baffc6d2cfb545920c4a09c852b138
-
SHA1
8c8064183e636a58f6e8cc12eb3c4a60ba1a34bd
-
SHA256
49dab872a5b2e9907b73be258b4bbba2f86677af674ed12a6a3f40b3e7543c84
-
SHA512
85007d6de19c3f2db2ba6a26a23832fbb8ed13e8d5584792d33262557eca363b2c285e9d9e56a492f8792f81eeb2723d18c8ed9d05b1c66305229bf88aa9bac4
-
SSDEEP
49152:fOawK7777777777777777777777777777777777777777777777777777777777f:fm
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2916 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jhswukte\ImagePath = "C:\\Windows\\SysWOW64\\jhswukte\\gfrnscmz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4720 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
gfrnscmz.exepid process 2296 gfrnscmz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gfrnscmz.exedescription pid process target process PID 2296 set thread context of 4720 2296 gfrnscmz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3668 sc.exe 2248 sc.exe 2380 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3968 1284 WerFault.exe f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe 1764 2296 WerFault.exe gfrnscmz.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exegfrnscmz.exedescription pid process target process PID 1284 wrote to memory of 1052 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 1052 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 1052 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 3640 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 3640 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 3640 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe cmd.exe PID 1284 wrote to memory of 3668 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 3668 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 3668 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2248 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2248 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2248 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2380 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2380 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2380 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe sc.exe PID 1284 wrote to memory of 2916 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe netsh.exe PID 1284 wrote to memory of 2916 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe netsh.exe PID 1284 wrote to memory of 2916 1284 f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe netsh.exe PID 2296 wrote to memory of 4720 2296 gfrnscmz.exe svchost.exe PID 2296 wrote to memory of 4720 2296 gfrnscmz.exe svchost.exe PID 2296 wrote to memory of 4720 2296 gfrnscmz.exe svchost.exe PID 2296 wrote to memory of 4720 2296 gfrnscmz.exe svchost.exe PID 2296 wrote to memory of 4720 2296 gfrnscmz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jhswukte\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gfrnscmz.exe" C:\Windows\SysWOW64\jhswukte\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jhswukte binPath= "C:\Windows\SysWOW64\jhswukte\gfrnscmz.exe /d\"C:\Users\Admin\AppData\Local\Temp\f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jhswukte "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jhswukte2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 10362⤵
- Program crash
-
C:\Windows\SysWOW64\jhswukte\gfrnscmz.exeC:\Windows\SysWOW64\jhswukte\gfrnscmz.exe /d"C:\Users\Admin\AppData\Local\Temp\f7baffc6d2cfb545920c4a09c852b138_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 5202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1284 -ip 12841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2296 -ip 22961⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\gfrnscmz.exeFilesize
11.5MB
MD5599a0d2650ebeb4f8caad2a57db1e228
SHA1b2bf4aff89d049e9e5dc96601e2730223ecfb487
SHA256df226cfc70af7e19b01b7bb1f2e1e5adbf543774ab8d2ec57b907094f6971dd3
SHA5126f9980f2cfb2e2c1ee32847d354cc97dacd5829c97cee1a40cc1aef28401e00e9a8ad369e9134c6ddd59600d031697d5bc39b9c6add609494717189d39b25146
-
memory/1284-1-0x0000000000570000-0x0000000000670000-memory.dmpFilesize
1024KB
-
memory/1284-2-0x00000000004C0000-0x00000000004D3000-memory.dmpFilesize
76KB
-
memory/1284-3-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1284-7-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1284-8-0x00000000004C0000-0x00000000004D3000-memory.dmpFilesize
76KB
-
memory/2296-10-0x00000000005C0000-0x00000000006C0000-memory.dmpFilesize
1024KB
-
memory/2296-11-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2296-17-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4720-12-0x0000000000140000-0x0000000000155000-memory.dmpFilesize
84KB
-
memory/4720-15-0x0000000000140000-0x0000000000155000-memory.dmpFilesize
84KB
-
memory/4720-16-0x0000000000140000-0x0000000000155000-memory.dmpFilesize
84KB
-
memory/4720-18-0x0000000000140000-0x0000000000155000-memory.dmpFilesize
84KB
-
memory/4720-19-0x0000000000140000-0x0000000000155000-memory.dmpFilesize
84KB