Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe
-
Size
11.4MB
-
MD5
f8256df8c758c14405aaf36f704caaad
-
SHA1
087dfabfb57a9a0896609642d9e18dc60939e378
-
SHA256
a221a2996b315a116ccfe8e2d7b553fc3a02e7ebb8a11e78e5117f11ed2cfc62
-
SHA512
37606175aca89abcec765db9d51a9237945827dab77f66ce719b5bb9e9e6d7db77ec8a6af97e5d34694065973417d1930897f37c5621033ebf87100436ccdd4b
-
SSDEEP
98304:4UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUf:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\timtftms = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2744 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\timtftms\ImagePath = "C:\\Windows\\SysWOW64\\timtftms\\umvdanzt.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2484 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
umvdanzt.exepid process 2596 umvdanzt.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
umvdanzt.exedescription pid process target process PID 2596 set thread context of 2484 2596 umvdanzt.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2556 sc.exe 2592 sc.exe 2740 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exeumvdanzt.exedescription pid process target process PID 1632 wrote to memory of 2156 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2156 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2156 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2156 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2668 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2668 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2668 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2668 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe cmd.exe PID 1632 wrote to memory of 2556 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2556 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2556 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2556 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2592 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2592 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2592 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2592 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2740 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2740 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2740 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2740 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe sc.exe PID 1632 wrote to memory of 2744 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe netsh.exe PID 1632 wrote to memory of 2744 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe netsh.exe PID 1632 wrote to memory of 2744 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe netsh.exe PID 1632 wrote to memory of 2744 1632 f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe netsh.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe PID 2596 wrote to memory of 2484 2596 umvdanzt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\timtftms\2⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\umvdanzt.exe" C:\Windows\SysWOW64\timtftms\2⤵PID:2668
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create timtftms binPath= "C:\Windows\SysWOW64\timtftms\umvdanzt.exe /d\"C:\Users\Admin\AppData\Local\Temp\f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2556
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description timtftms "wifi internet conection"2⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start timtftms2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2744
-
-
C:\Windows\SysWOW64\timtftms\umvdanzt.exeC:\Windows\SysWOW64\timtftms\umvdanzt.exe /d"C:\Users\Admin\AppData\Local\Temp\f8256df8c758c14405aaf36f704caaad_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD5b1c1363533986c1aa5d48631dc7f97f2
SHA1f5d2f43061f9b1e1e0b6b7b0fb389eee387b4839
SHA2563810017db0611c53b8ec0cd199473364614e2dab164d746a5fd1ddc4a6d754b6
SHA512151dc8e313283c366f915c8eb7495971594b8f955a742abf8701da3b484b688c5d5fcfbb45751d5f09e47878c9b12d658e3ef265f8ee12f8d6cd83095fc87f62