Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe
-
Size
13.3MB
-
MD5
fad02e51291b3038659473cff47e29d0
-
SHA1
5ab067004bc8296c68fd9371eb5be7a35925b51a
-
SHA256
93a0cf66597311ab47acf053542131ad5ed2410d1e25c67b1e77e7b324bd9e88
-
SHA512
dc8203a4281d15e5ffb791a9260917cd92e67db1658948f4da74e61ec0365a40263fe5a98d809ddf97173d243f7289b442041f4ae094a33009b05400169a69aa
-
SSDEEP
49152:EHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1884 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fjdvhiaw\ImagePath = "C:\\Windows\\SysWOW64\\fjdvhiaw\\yepashbn.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fad02e51291b3038659473cff47e29d0_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4864 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
yepashbn.exepid process 4232 yepashbn.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
yepashbn.exedescription pid process target process PID 4232 set thread context of 4864 4232 yepashbn.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3088 sc.exe 4720 sc.exe 4448 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1252 2560 WerFault.exe fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe 4572 4232 WerFault.exe yepashbn.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fad02e51291b3038659473cff47e29d0_JaffaCakes118.exeyepashbn.exedescription pid process target process PID 2560 wrote to memory of 2976 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 2976 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 2976 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 2916 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 2916 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 2916 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe cmd.exe PID 2560 wrote to memory of 4720 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 4720 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 4720 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 4448 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 4448 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 4448 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 3088 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 3088 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 3088 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe sc.exe PID 2560 wrote to memory of 1884 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe netsh.exe PID 2560 wrote to memory of 1884 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe netsh.exe PID 2560 wrote to memory of 1884 2560 fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe netsh.exe PID 4232 wrote to memory of 4864 4232 yepashbn.exe svchost.exe PID 4232 wrote to memory of 4864 4232 yepashbn.exe svchost.exe PID 4232 wrote to memory of 4864 4232 yepashbn.exe svchost.exe PID 4232 wrote to memory of 4864 4232 yepashbn.exe svchost.exe PID 4232 wrote to memory of 4864 4232 yepashbn.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fjdvhiaw\2⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yepashbn.exe" C:\Windows\SysWOW64\fjdvhiaw\2⤵PID:2916
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fjdvhiaw binPath= "C:\Windows\SysWOW64\fjdvhiaw\yepashbn.exe /d\"C:\Users\Admin\AppData\Local\Temp\fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4720 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fjdvhiaw "wifi internet conection"2⤵
- Launches sc.exe
PID:4448 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fjdvhiaw2⤵
- Launches sc.exe
PID:3088 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 12722⤵
- Program crash
PID:1252
-
C:\Windows\SysWOW64\fjdvhiaw\yepashbn.exeC:\Windows\SysWOW64\fjdvhiaw\yepashbn.exe /d"C:\Users\Admin\AppData\Local\Temp\fad02e51291b3038659473cff47e29d0_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 5122⤵
- Program crash
PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2560 -ip 25601⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4232 -ip 42321⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.4MB
MD5d7c88e6b719b111e4ab8f961ceecf185
SHA141171780c1316b26ff8761c2d2e78e114eb953c0
SHA256d5baa1c1de34cf7212a74dedac62bae9aab93992f93922e807c293610cca7dc9
SHA5124bf882a40c0757ea6702ea189d763eff618dc12cd67e6d31137f4293902fc79c06d649a0a8f42d9ed94d0a5619cee21758139637abbac2642a944743014207ae