Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
-
Size
13.4MB
-
MD5
fd38b33ef2c814530a6334068ede6c9e
-
SHA1
7db500679ab97ade3132968cefb5487341bfc7fa
-
SHA256
68f68b471d96eba7489c49f0764a552bece2be9a88eea0f4caa7cf0b532f242e
-
SHA512
018cb80f9bb521fd0367f47a43ab5f07d8d3ceb1c79a25dbfce82262aeea115eee6bba773c69c7de94cabc267ee1487d090a3afae0c9f638cd8a697b40fd17c0
-
SSDEEP
393216:qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Extracted
tofsee
194.61.3.129
defeatwax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\jcorfnti = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2688 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\jcorfnti\ImagePath = "C:\\Windows\\SysWOW64\\jcorfnti\\gtyszwcf.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2740 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
gtyszwcf.exepid process 552 gtyszwcf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gtyszwcf.exedescription pid process target process PID 552 set thread context of 2740 552 gtyszwcf.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2576 sc.exe 2748 sc.exe 2292 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exegtyszwcf.exedescription pid process target process PID 2512 wrote to memory of 1984 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1984 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1984 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1984 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1152 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1152 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1152 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 1152 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 2512 wrote to memory of 2576 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2576 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2576 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2576 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2748 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2748 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2748 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2748 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2292 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2292 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2292 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2292 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 2512 wrote to memory of 2688 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 2512 wrote to memory of 2688 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 2512 wrote to memory of 2688 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 2512 wrote to memory of 2688 2512 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe PID 552 wrote to memory of 2740 552 gtyszwcf.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jcorfnti\2⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gtyszwcf.exe" C:\Windows\SysWOW64\jcorfnti\2⤵PID:1152
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jcorfnti binPath= "C:\Windows\SysWOW64\jcorfnti\gtyszwcf.exe /d\"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2576 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jcorfnti "wifi internet conection"2⤵
- Launches sc.exe
PID:2748 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jcorfnti2⤵
- Launches sc.exe
PID:2292 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2688
-
C:\Windows\SysWOW64\jcorfnti\gtyszwcf.exeC:\Windows\SysWOW64\jcorfnti\gtyszwcf.exe /d"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.7MB
MD55c5568f8c6e1b4d4f5243aa2801f4686
SHA13a4be705bb3cbf96d96f50422989993a09b13427
SHA2565579126adf05adefda5f6fef7c464d10dc39edbddbe94fc6b8e5913d16c1beb6
SHA512c7eec0dfcc89ea873bfb6ed28e7879439389933a6575dcd372b7b97b37244e4a05b7049c53d423baaafd363672e2389b8b3838f58114da7c5382c01238b977df