Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
-
Size
14.2MB
-
MD5
fd10a12bfa4567277ceeeee89218d272
-
SHA1
1e4c7b5cd7fcd6c5f8d620951316c3dc60e55b19
-
SHA256
afba2105b4e169404b3a9cf3bc73e10d943884b176bfeaa1fc54c985daa0bcd2
-
SHA512
90e5592cbcb97e6301317679f8a0acec08f6409e400331528f5698d799c214112ca98ce3b37e7990d00e5a7d6d6c213aceb7d78a67a7c171ccb1f6728fba7411
-
SSDEEP
24576:YerU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbL:YsW
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\poawobff = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2816 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\poawobff\ImagePath = "C:\\Windows\\SysWOW64\\poawobff\\gpxvoqtt.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 940 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
gpxvoqtt.exepid process 2820 gpxvoqtt.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gpxvoqtt.exedescription pid process target process PID 2820 set thread context of 940 2820 gpxvoqtt.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2100 sc.exe 2608 sc.exe 2680 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exegpxvoqtt.exedescription pid process target process PID 2364 wrote to memory of 1216 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 1216 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 1216 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 1216 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 2424 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 2424 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 2424 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 2424 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 2100 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2100 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2100 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2100 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2608 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2608 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2608 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2608 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2680 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2680 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2680 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2680 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 2364 wrote to memory of 2816 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 2364 wrote to memory of 2816 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 2364 wrote to memory of 2816 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 2364 wrote to memory of 2816 2364 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe PID 2820 wrote to memory of 940 2820 gpxvoqtt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\poawobff\2⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gpxvoqtt.exe" C:\Windows\SysWOW64\poawobff\2⤵PID:2424
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create poawobff binPath= "C:\Windows\SysWOW64\poawobff\gpxvoqtt.exe /d\"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2100 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description poawobff "wifi internet conection"2⤵
- Launches sc.exe
PID:2608 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start poawobff2⤵
- Launches sc.exe
PID:2680 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2816
-
C:\Windows\SysWOW64\poawobff\gpxvoqtt.exeC:\Windows\SysWOW64\poawobff\gpxvoqtt.exe /d"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD58de6c7a29fbf9c4c103b6c15b425b12f
SHA1e4692c2eb7b118606d02104923065acf44f084b0
SHA256a6c163a8eb8577c5baba53b7620e3121aee381fb9b4c92b3344b8d092a2cc41c
SHA512103838d815bfebaaab2302b469376de082e0c84d25f265a1d132c9ebe4c68e2e8106d11ef4f378ce7f5b2fb78a89384662c073e24d662a91dce0d2917bc9d76e