Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe
-
Size
12.8MB
-
MD5
fc36b1375b31d55e67f16990365d95ff
-
SHA1
4957b074548b93c0eeb22fbc2566b0fa08816d76
-
SHA256
fe784fd541b07359345cdfb43b8065e2bc998174db60cf3a17f8346db36490c8
-
SHA512
b9d2c225d480098889360bef9a892ca97593e27b32304399392af23cc72c6f31d34d7c1c131444e9eb0ebdc0dfb64d4834a0aac1cd0802787b01934dc9209165
-
SSDEEP
49152:NFUk///////////////////////////////////////////////////////////n:NF
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\gxrvokgf = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2228 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\gxrvokgf\ImagePath = "C:\\Windows\\SysWOW64\\gxrvokgf\\jlgmfsc.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2332 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
jlgmfsc.exepid process 2664 jlgmfsc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jlgmfsc.exedescription pid process target process PID 2664 set thread context of 2332 2664 jlgmfsc.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2460 sc.exe 2564 sc.exe 2924 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exejlgmfsc.exedescription pid process target process PID 1400 wrote to memory of 1936 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 1936 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 1936 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 1936 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 2104 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 2104 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 2104 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 2104 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe cmd.exe PID 1400 wrote to memory of 2460 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2460 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2460 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2460 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2564 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2564 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2564 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2564 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2924 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2924 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2924 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2924 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe sc.exe PID 1400 wrote to memory of 2228 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe netsh.exe PID 1400 wrote to memory of 2228 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe netsh.exe PID 1400 wrote to memory of 2228 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe netsh.exe PID 1400 wrote to memory of 2228 1400 fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe netsh.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe PID 2664 wrote to memory of 2332 2664 jlgmfsc.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gxrvokgf\2⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jlgmfsc.exe" C:\Windows\SysWOW64\gxrvokgf\2⤵PID:2104
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gxrvokgf binPath= "C:\Windows\SysWOW64\gxrvokgf\jlgmfsc.exe /d\"C:\Users\Admin\AppData\Local\Temp\fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2460 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gxrvokgf "wifi internet conection"2⤵
- Launches sc.exe
PID:2564 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gxrvokgf2⤵
- Launches sc.exe
PID:2924 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2228
-
C:\Windows\SysWOW64\gxrvokgf\jlgmfsc.exeC:\Windows\SysWOW64\gxrvokgf\jlgmfsc.exe /d"C:\Users\Admin\AppData\Local\Temp\fc36b1375b31d55e67f16990365d95ff_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD559c7b8307d93f1dfb11ca0b9016a1df2
SHA1ba56661d891a9c9e86ded20df9a9be77bf1c3d58
SHA25689c236576099706f13f54b644c3a855a63f6d2b732501d341b74f80e504976f3
SHA512327a5e099df6d7f1c978264fc773e4438f664bd8206bb359747109cf34d51a24f99441f1b0b1b6b723ed5367a1adac0c700becfb4008f74f5523a865fcdfdc95