Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe
-
Size
11.9MB
-
MD5
fc8f9838b702553e0ecef702ef97ce84
-
SHA1
881df8e9dd0ae1c881e2b388befb16db0a55c6aa
-
SHA256
8044cd332ec2aa866eecbec9aa0cc0dcf304b2de5772e1101366c2960e94fa40
-
SHA512
020dd1109c79116f50a9124cafd14a1a634c1333e77b7de621ecea245c629eb607695bf56d0d9d4ebb00de5c4c6290c50b5e877c57a1251f1315f9635cbf4cc7
-
SSDEEP
98304:kvjOF//////////////////////////////////////////////////////////n:O
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4896 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qfqskpel\ImagePath = "C:\\Windows\\SysWOW64\\qfqskpel\\sxhcwifh.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4828 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
sxhcwifh.exepid process 632 sxhcwifh.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sxhcwifh.exedescription pid process target process PID 632 set thread context of 4828 632 sxhcwifh.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4328 sc.exe 4524 sc.exe 1256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4764 3360 WerFault.exe fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe 3652 632 WerFault.exe sxhcwifh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exesxhcwifh.exedescription pid process target process PID 3360 wrote to memory of 2952 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 2952 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 2952 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 1984 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 1984 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 1984 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe cmd.exe PID 3360 wrote to memory of 4328 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4328 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4328 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4524 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4524 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4524 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 1256 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 1256 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 1256 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe sc.exe PID 3360 wrote to memory of 4896 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe netsh.exe PID 3360 wrote to memory of 4896 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe netsh.exe PID 3360 wrote to memory of 4896 3360 fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe netsh.exe PID 632 wrote to memory of 4828 632 sxhcwifh.exe svchost.exe PID 632 wrote to memory of 4828 632 sxhcwifh.exe svchost.exe PID 632 wrote to memory of 4828 632 sxhcwifh.exe svchost.exe PID 632 wrote to memory of 4828 632 sxhcwifh.exe svchost.exe PID 632 wrote to memory of 4828 632 sxhcwifh.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qfqskpel\2⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sxhcwifh.exe" C:\Windows\SysWOW64\qfqskpel\2⤵PID:1984
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qfqskpel binPath= "C:\Windows\SysWOW64\qfqskpel\sxhcwifh.exe /d\"C:\Users\Admin\AppData\Local\Temp\fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4328 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qfqskpel "wifi internet conection"2⤵
- Launches sc.exe
PID:4524 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qfqskpel2⤵
- Launches sc.exe
PID:1256 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 10442⤵
- Program crash
PID:4764
-
C:\Windows\SysWOW64\qfqskpel\sxhcwifh.exeC:\Windows\SysWOW64\qfqskpel\sxhcwifh.exe /d"C:\Users\Admin\AppData\Local\Temp\fc8f9838b702553e0ecef702ef97ce84_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 5082⤵
- Program crash
PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3360 -ip 33601⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 632 -ip 6321⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD589667467cfe74141126b24255e444e30
SHA157ec3d326d3a7f955794d56cb622b0c8e70dba63
SHA2561599469609d025eca3e1c16a9b1e8f5cbbc098591f0cc2a48026a1bfd4bf7b44
SHA512e769b3d0c240e00c4fc0a8aa50c54da8cf693204ce363f14f67b165756ab01a96e0ce9a7261f2b10faf5696d4fd8766fee199a2c72ef99c6a3390be627bff6ab