Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe
-
Size
14.2MB
-
MD5
fd10a12bfa4567277ceeeee89218d272
-
SHA1
1e4c7b5cd7fcd6c5f8d620951316c3dc60e55b19
-
SHA256
afba2105b4e169404b3a9cf3bc73e10d943884b176bfeaa1fc54c985daa0bcd2
-
SHA512
90e5592cbcb97e6301317679f8a0acec08f6409e400331528f5698d799c214112ca98ce3b37e7990d00e5a7d6d6c213aceb7d78a67a7c171ccb1f6728fba7411
-
SSDEEP
24576:YerU5sWbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbL:YsW
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2032 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bajqqdxu\ImagePath = "C:\\Windows\\SysWOW64\\bajqqdxu\\fapzejbz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
fapzejbz.exepid process 3956 fapzejbz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fapzejbz.exedescription pid process target process PID 3956 set thread context of 4324 3956 fapzejbz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 956 sc.exe 3012 sc.exe 116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exefapzejbz.exedescription pid process target process PID 968 wrote to memory of 3680 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 3680 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 3680 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 3880 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 3880 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 3880 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe cmd.exe PID 968 wrote to memory of 956 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 956 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 956 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 3012 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 3012 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 3012 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 116 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 116 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 116 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe sc.exe PID 968 wrote to memory of 2032 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 968 wrote to memory of 2032 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 968 wrote to memory of 2032 968 fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe netsh.exe PID 3956 wrote to memory of 4324 3956 fapzejbz.exe svchost.exe PID 3956 wrote to memory of 4324 3956 fapzejbz.exe svchost.exe PID 3956 wrote to memory of 4324 3956 fapzejbz.exe svchost.exe PID 3956 wrote to memory of 4324 3956 fapzejbz.exe svchost.exe PID 3956 wrote to memory of 4324 3956 fapzejbz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bajqqdxu\2⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fapzejbz.exe" C:\Windows\SysWOW64\bajqqdxu\2⤵PID:3880
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bajqqdxu binPath= "C:\Windows\SysWOW64\bajqqdxu\fapzejbz.exe /d\"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:956 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bajqqdxu "wifi internet conection"2⤵
- Launches sc.exe
PID:3012 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bajqqdxu2⤵
- Launches sc.exe
PID:116 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2032
-
C:\Windows\SysWOW64\bajqqdxu\fapzejbz.exeC:\Windows\SysWOW64\bajqqdxu\fapzejbz.exe /d"C:\Users\Admin\AppData\Local\Temp\fd10a12bfa4567277ceeeee89218d272_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:4324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.0MB
MD54f2628986b00bf328d371e38ddfd6a9a
SHA1d5d74da6c103edf9a228b361281ce4755e475c5c
SHA2564a38d999c5cbb9ac4108f08b197488cf4e7644a056da098c98eee72849713c97
SHA5128789359b723df709572106412664242610f57dc3c1948ba5eb3e58ad0974c50508721ff908394d8c941ff85f64e900eb50061316ccd7a3c583b37aba646834ab