Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe
-
Size
14.4MB
-
MD5
f93f672e45a5c1129aba812e94192a07
-
SHA1
595bed5941aa45c13e64f34f370072d28dda19ef
-
SHA256
592aae666394a3d72e7041676ddd615d31ca54f3a41c3c916580e2692b047ea9
-
SHA512
32058e8d6b9c3710afa38bf9c9e5fa123cf2442a4de28df09b66ab3ac5fabad998c1bc29a4fec51f9d5dd6dfa80ca5bdb2dad08efca72e1861795cc1d7050632
-
SSDEEP
49152:+yqI2kmso555555555555555555555555555555555555555555555555555555h:+yqI2
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4240 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\lvestcod\ImagePath = "C:\\Windows\\SysWOW64\\lvestcod\\tcwbtsnj.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4792 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
tcwbtsnj.exepid process 4712 tcwbtsnj.exe -
Drops file in System32 directory 2 IoCs
Processes:
tcwbtsnj.exedescription ioc process File created C:\Windows\SysWOW64\¤xu tcwbtsnj.exe File created C:\Windows\SysWOW64\ä?t tcwbtsnj.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tcwbtsnj.exedescription pid process target process PID 4712 set thread context of 4792 4712 tcwbtsnj.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1824 sc.exe 1480 sc.exe 4524 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1380 4324 WerFault.exe f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe 4700 4712 WerFault.exe tcwbtsnj.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exetcwbtsnj.exedescription pid process target process PID 4324 wrote to memory of 1544 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 1544 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 1544 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 3556 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 3556 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 3556 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe cmd.exe PID 4324 wrote to memory of 1824 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 1824 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 1824 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 1480 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 1480 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 1480 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 4524 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 4524 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 4524 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe sc.exe PID 4324 wrote to memory of 4240 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe netsh.exe PID 4324 wrote to memory of 4240 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe netsh.exe PID 4324 wrote to memory of 4240 4324 f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe netsh.exe PID 4712 wrote to memory of 4792 4712 tcwbtsnj.exe svchost.exe PID 4712 wrote to memory of 4792 4712 tcwbtsnj.exe svchost.exe PID 4712 wrote to memory of 4792 4712 tcwbtsnj.exe svchost.exe PID 4712 wrote to memory of 4792 4712 tcwbtsnj.exe svchost.exe PID 4712 wrote to memory of 4792 4712 tcwbtsnj.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lvestcod\2⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tcwbtsnj.exe" C:\Windows\SysWOW64\lvestcod\2⤵PID:3556
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lvestcod binPath= "C:\Windows\SysWOW64\lvestcod\tcwbtsnj.exe /d\"C:\Users\Admin\AppData\Local\Temp\f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1824 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lvestcod "wifi internet conection"2⤵
- Launches sc.exe
PID:1480 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lvestcod2⤵
- Launches sc.exe
PID:4524 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10402⤵
- Program crash
PID:1380
-
C:\Windows\SysWOW64\lvestcod\tcwbtsnj.exeC:\Windows\SysWOW64\lvestcod\tcwbtsnj.exe /d"C:\Users\Admin\AppData\Local\Temp\f93f672e45a5c1129aba812e94192a07_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 5162⤵
- Program crash
PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4324 -ip 43241⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4712 -ip 47121⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD569b768ad43fb11a78134dc707d7f99c9
SHA17f385ad2e156e1ffc5ed35e52b32e4c9531d071d
SHA25607beb554287a23eeb745cac87d02aa3e7ba3bba6bc4772c6543b23d7463cb8f9
SHA51207026cd7848288551530c2d1086cfadc2a77628fcf9aa38393344b4284451d0d544af9fc7d6b4d024039e1f54a709aab45dc990194fce00c8c7486922675f4a2