Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe
-
Size
13.5MB
-
MD5
fdf33bcaac18604051afb04b0b52416f
-
SHA1
3a125b929ebaea43caf9700fa589d2329e38d019
-
SHA256
1cfae1204e52198353fa94fd41d6d3496a316735d98f334eb300becdd837d90d
-
SHA512
bd26dcdfcaa2d61498610613d5e8ca67699f234db3b906a6c982e957474c315e5cff30f9701692c0746eb8d0fab336f9f5a14cb3ffe21569004283599aad75f5
-
SSDEEP
6144:m2BxZXDsssssssssssssssssssssssssssssssssssssssssssssssssssssssss:m4V
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3852 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qdwfbqve\ImagePath = "C:\\Windows\\SysWOW64\\qdwfbqve\\adlljhlu.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 564 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
adlljhlu.exepid process 2196 adlljhlu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
adlljhlu.exedescription pid process target process PID 2196 set thread context of 564 2196 adlljhlu.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4124 sc.exe 1648 sc.exe 2108 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exeadlljhlu.exedescription pid process target process PID 2264 wrote to memory of 1856 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1856 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1856 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 3296 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 3296 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 3296 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 4124 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 4124 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 4124 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 1648 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 1648 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 1648 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 2108 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 2108 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2264 wrote to memory of 2108 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe sc.exe PID 2196 wrote to memory of 564 2196 adlljhlu.exe svchost.exe PID 2196 wrote to memory of 564 2196 adlljhlu.exe svchost.exe PID 2196 wrote to memory of 564 2196 adlljhlu.exe svchost.exe PID 2196 wrote to memory of 564 2196 adlljhlu.exe svchost.exe PID 2196 wrote to memory of 564 2196 adlljhlu.exe svchost.exe PID 2264 wrote to memory of 3852 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe netsh.exe PID 2264 wrote to memory of 3852 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe netsh.exe PID 2264 wrote to memory of 3852 2264 fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qdwfbqve\2⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\adlljhlu.exe" C:\Windows\SysWOW64\qdwfbqve\2⤵PID:3296
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qdwfbqve binPath= "C:\Windows\SysWOW64\qdwfbqve\adlljhlu.exe /d\"C:\Users\Admin\AppData\Local\Temp\fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4124 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qdwfbqve "wifi internet conection"2⤵
- Launches sc.exe
PID:1648 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qdwfbqve2⤵
- Launches sc.exe
PID:2108 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3852
-
C:\Windows\SysWOW64\qdwfbqve\adlljhlu.exeC:\Windows\SysWOW64\qdwfbqve\adlljhlu.exe /d"C:\Users\Admin\AppData\Local\Temp\fdf33bcaac18604051afb04b0b52416f_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.3MB
MD560d71b21e4bd729c3a01b8cb9007b149
SHA1ce9e53733dc5dd997f2937bf8dbef3428d2cdd66
SHA25630dbc9eb7633dc91dea445c78ed23fd782f9eeea263d314b98cd8a0afaf540c3
SHA5121e0d429eddcafac4f014e077980bd49768d5c945ba2cf7ec626a7e956b80c30e417d53db134cbb5915882a000c9c7b9b98caf6adcf48c44c61f41d228ab7a389