Analysis
-
max time kernel
157s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
fb53a3645626f491923c495997330c8d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb53a3645626f491923c495997330c8d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fb53a3645626f491923c495997330c8d_JaffaCakes118.exe
-
Size
14.8MB
-
MD5
fb53a3645626f491923c495997330c8d
-
SHA1
da6c44e90b85ea788c4076b7ed67d1b02213ccfe
-
SHA256
ad93fa58692bf500dc7f4a54513d87f0cceeaf9a955bc3d366abd2e2bbcaeedb
-
SHA512
311e78a1740839ff21a31f1082d881ce31157c11767b901bef6232b9afd34e7fe18d93badf8f54d65ef4ec1d64dcfdf7ec6cc9f1ee25429fe9c51342b0926a37
-
SSDEEP
24576:PjCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee+:P/D
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1900 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aoeqgzqz\ImagePath = "C:\\Windows\\SysWOW64\\aoeqgzqz\\oxnbcqfl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fb53a3645626f491923c495997330c8d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fb53a3645626f491923c495997330c8d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
oxnbcqfl.exepid process 468 oxnbcqfl.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
oxnbcqfl.exedescription pid process target process PID 468 set thread context of 1372 468 oxnbcqfl.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1100 sc.exe 708 sc.exe 4988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fb53a3645626f491923c495997330c8d_JaffaCakes118.exeoxnbcqfl.exedescription pid process target process PID 3800 wrote to memory of 4444 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 4444 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 4444 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 4016 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 4016 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 4016 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe cmd.exe PID 3800 wrote to memory of 1100 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 1100 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 1100 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 708 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 708 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 708 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 4988 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 4988 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 4988 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe sc.exe PID 3800 wrote to memory of 1900 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe netsh.exe PID 3800 wrote to memory of 1900 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe netsh.exe PID 3800 wrote to memory of 1900 3800 fb53a3645626f491923c495997330c8d_JaffaCakes118.exe netsh.exe PID 468 wrote to memory of 1372 468 oxnbcqfl.exe svchost.exe PID 468 wrote to memory of 1372 468 oxnbcqfl.exe svchost.exe PID 468 wrote to memory of 1372 468 oxnbcqfl.exe svchost.exe PID 468 wrote to memory of 1372 468 oxnbcqfl.exe svchost.exe PID 468 wrote to memory of 1372 468 oxnbcqfl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb53a3645626f491923c495997330c8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb53a3645626f491923c495997330c8d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\aoeqgzqz\2⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oxnbcqfl.exe" C:\Windows\SysWOW64\aoeqgzqz\2⤵PID:4016
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create aoeqgzqz binPath= "C:\Windows\SysWOW64\aoeqgzqz\oxnbcqfl.exe /d\"C:\Users\Admin\AppData\Local\Temp\fb53a3645626f491923c495997330c8d_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1100 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description aoeqgzqz "wifi internet conection"2⤵
- Launches sc.exe
PID:708 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start aoeqgzqz2⤵
- Launches sc.exe
PID:4988 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1900
-
C:\Windows\SysWOW64\aoeqgzqz\oxnbcqfl.exeC:\Windows\SysWOW64\aoeqgzqz\oxnbcqfl.exe /d"C:\Users\Admin\AppData\Local\Temp\fb53a3645626f491923c495997330c8d_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:1372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD5606335d96f346cdbde96472aecaf4f61
SHA165b0c6867ef24b431673c10ea5e0c0f5ee2771d2
SHA256d41439ee16bcb6955bbf7e46d64e2872e921913c853af6d96f2c2cc2bc0b8b67
SHA5125900dadce96207ba4523459ebadda7eb4ae7c57915d0bc83d3a8d5d73edd8939d499bbaa343186c4dcacf6a3307b8790046f597e8977be2e0f6a2beadb06f803