Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe
-
Size
13.6MB
-
MD5
fa05c055fc43c8c597197b590670ca85
-
SHA1
8b4e076dd4f300a82a21e255e14413737b575b4c
-
SHA256
c0aea4faca6ebef23d42c4daa61585c835aaa69cb819a29bf67b03881469bf04
-
SHA512
1455a615d3a8b3b0d50350da785784baf830f3b3b10cabaa19c7d97a112a3334fbcc0e5a0883b3fa77135f1f173185a83c44f7d113f82b21000e9fa6ca090798
-
SSDEEP
49152:KR88888888888888888888888888888888888888888888888888888888888884:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 952 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tzfduarp\ImagePath = "C:\\Windows\\SysWOW64\\tzfduarp\\cdfgadyq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4756 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
cdfgadyq.exepid process 3968 cdfgadyq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cdfgadyq.exedescription pid process target process PID 3968 set thread context of 4756 3968 cdfgadyq.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3740 sc.exe 956 sc.exe 4720 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3644 4820 WerFault.exe fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe 2056 3968 WerFault.exe cdfgadyq.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fa05c055fc43c8c597197b590670ca85_JaffaCakes118.execdfgadyq.exedescription pid process target process PID 4820 wrote to memory of 3732 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3732 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3732 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3788 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3788 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3788 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe cmd.exe PID 4820 wrote to memory of 3740 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 3740 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 3740 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 956 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 956 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 956 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 4720 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 4720 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 4720 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe sc.exe PID 4820 wrote to memory of 952 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe netsh.exe PID 4820 wrote to memory of 952 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe netsh.exe PID 4820 wrote to memory of 952 4820 fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe netsh.exe PID 3968 wrote to memory of 4756 3968 cdfgadyq.exe svchost.exe PID 3968 wrote to memory of 4756 3968 cdfgadyq.exe svchost.exe PID 3968 wrote to memory of 4756 3968 cdfgadyq.exe svchost.exe PID 3968 wrote to memory of 4756 3968 cdfgadyq.exe svchost.exe PID 3968 wrote to memory of 4756 3968 cdfgadyq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tzfduarp\2⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cdfgadyq.exe" C:\Windows\SysWOW64\tzfduarp\2⤵PID:3788
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tzfduarp binPath= "C:\Windows\SysWOW64\tzfduarp\cdfgadyq.exe /d\"C:\Users\Admin\AppData\Local\Temp\fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3740 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tzfduarp "wifi internet conection"2⤵
- Launches sc.exe
PID:956 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tzfduarp2⤵
- Launches sc.exe
PID:4720 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 10322⤵
- Program crash
PID:3644
-
C:\Windows\SysWOW64\tzfduarp\cdfgadyq.exeC:\Windows\SysWOW64\tzfduarp\cdfgadyq.exe /d"C:\Users\Admin\AppData\Local\Temp\fa05c055fc43c8c597197b590670ca85_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 5162⤵
- Program crash
PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4820 -ip 48201⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3968 -ip 39681⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD51229c1b8610738320314be8ead566c59
SHA154a2fb77992de041925e920fdc0afff9e11d1d1e
SHA25683ba4694f8f3af7e91037c1da3cc8bb09ad3e1aac6817c5f85fc6ccc7d67c15e
SHA5124fff24e2828d15469c01823bdc83f5efd8b56030c38ff136ceed785e6ea7a7ad806490ad606c5be8451c05dcbd69a9371fb182f523abbee3f63d8156225184d4