Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe
-
Size
14.6MB
-
MD5
fbbc300be6ec59b88fe78c250e98f0f4
-
SHA1
e59eae7c8050cc027aad2f6801808ec899527cf5
-
SHA256
49911d61a324bcfb2722acc8f21c54e093fed68c99989b26bd031298bb84f4b7
-
SHA512
25f9a3f6fe4a1c7b852c8a9adee66c5a762c0021aa73b6d1bcefb9a811efbc558573955877b4c831ca6204fb3235a724a0dcd6234f8bb82db2a04b59edeb6929
-
SSDEEP
49152:Sj5555555555555555555555555555555555555555555555555555555555555F:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\zmcgqzrs = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1564 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zmcgqzrs\ImagePath = "C:\\Windows\\SysWOW64\\zmcgqzrs\\kjzvcyd.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2588 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
kjzvcyd.exepid process 2652 kjzvcyd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kjzvcyd.exedescription pid process target process PID 2652 set thread context of 2588 2652 kjzvcyd.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2568 sc.exe 2660 sc.exe 2364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exekjzvcyd.exedescription pid process target process PID 3068 wrote to memory of 2704 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 2704 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 2704 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 2704 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 3044 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 3044 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 3044 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 3044 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe cmd.exe PID 3068 wrote to memory of 2568 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2568 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2568 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2568 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2660 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2660 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2660 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2660 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2364 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2364 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2364 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 3068 wrote to memory of 2364 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe sc.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 2652 wrote to memory of 2588 2652 kjzvcyd.exe svchost.exe PID 3068 wrote to memory of 1564 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe netsh.exe PID 3068 wrote to memory of 1564 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe netsh.exe PID 3068 wrote to memory of 1564 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe netsh.exe PID 3068 wrote to memory of 1564 3068 fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zmcgqzrs\2⤵PID:2704
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kjzvcyd.exe" C:\Windows\SysWOW64\zmcgqzrs\2⤵PID:3044
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zmcgqzrs binPath= "C:\Windows\SysWOW64\zmcgqzrs\kjzvcyd.exe /d\"C:\Users\Admin\AppData\Local\Temp\fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2568 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zmcgqzrs "wifi internet conection"2⤵
- Launches sc.exe
PID:2660 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zmcgqzrs2⤵
- Launches sc.exe
PID:2364 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1564
-
C:\Windows\SysWOW64\zmcgqzrs\kjzvcyd.exeC:\Windows\SysWOW64\zmcgqzrs\kjzvcyd.exe /d"C:\Users\Admin\AppData\Local\Temp\fbbc300be6ec59b88fe78c250e98f0f4_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD5beb10d466ae9eeaea509c5663b82b4f4
SHA11a431b846ff8e033e4351aef84ec77207cb2f6cf
SHA2569dc67eb604a28ae9d9048c2736b6761849d662f404eac0a05a15b5343ffed4ba
SHA512d69d8bbb770a8394628e69be14a76772e567e0daf7e155ef27a1311cb4098bf4e726887c966f20eaae50f189cfc73648affbeb4ff1dd0c932b8e436f7a42bc7b