Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe
-
Size
13.4MB
-
MD5
fd38b33ef2c814530a6334068ede6c9e
-
SHA1
7db500679ab97ade3132968cefb5487341bfc7fa
-
SHA256
68f68b471d96eba7489c49f0764a552bece2be9a88eea0f4caa7cf0b532f242e
-
SHA512
018cb80f9bb521fd0367f47a43ab5f07d8d3ceb1c79a25dbfce82262aeea115eee6bba773c69c7de94cabc267ee1487d090a3afae0c9f638cd8a697b40fd17c0
-
SSDEEP
393216:qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:
Malware Config
Extracted
tofsee
194.61.3.129
defeatwax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 808 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\iuxpdpjy\ImagePath = "C:\\Windows\\SysWOW64\\iuxpdpjy\\qmjemsfg.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3648 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
qmjemsfg.exepid process 928 qmjemsfg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qmjemsfg.exedescription pid process target process PID 928 set thread context of 3648 928 qmjemsfg.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4560 sc.exe 3576 sc.exe 4996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3348 5004 WerFault.exe fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe 2776 928 WerFault.exe qmjemsfg.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exeqmjemsfg.exedescription pid process target process PID 5004 wrote to memory of 1496 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 1496 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 1496 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 3960 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 3960 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 3960 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe cmd.exe PID 5004 wrote to memory of 4560 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 4560 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 4560 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 3576 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 3576 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 3576 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 4996 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 4996 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 4996 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe sc.exe PID 5004 wrote to memory of 808 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 5004 wrote to memory of 808 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 5004 wrote to memory of 808 5004 fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe netsh.exe PID 928 wrote to memory of 3648 928 qmjemsfg.exe svchost.exe PID 928 wrote to memory of 3648 928 qmjemsfg.exe svchost.exe PID 928 wrote to memory of 3648 928 qmjemsfg.exe svchost.exe PID 928 wrote to memory of 3648 928 qmjemsfg.exe svchost.exe PID 928 wrote to memory of 3648 928 qmjemsfg.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\iuxpdpjy\2⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qmjemsfg.exe" C:\Windows\SysWOW64\iuxpdpjy\2⤵PID:3960
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create iuxpdpjy binPath= "C:\Windows\SysWOW64\iuxpdpjy\qmjemsfg.exe /d\"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4560 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description iuxpdpjy "wifi internet conection"2⤵
- Launches sc.exe
PID:3576 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start iuxpdpjy2⤵
- Launches sc.exe
PID:4996 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 8882⤵
- Program crash
PID:3348
-
C:\Windows\SysWOW64\iuxpdpjy\qmjemsfg.exeC:\Windows\SysWOW64\iuxpdpjy\qmjemsfg.exe /d"C:\Users\Admin\AppData\Local\Temp\fd38b33ef2c814530a6334068ede6c9e_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 5362⤵
- Program crash
PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5004 -ip 50041⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 928 -ip 9281⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD5114c1134ca66c4b2418659faae3ad11f
SHA1a4111ca4975ab185127d8cbb4bbacccf976d8e54
SHA256d527481d7199dc80dd07a77ec5c5af5486fa0bda88a3a653a21625e6a5a3ec8b
SHA5128b73ee56e6cef463e3115f38018a639276a97c5503eb6e30f4ba0dca1e303d673ba2617b5e822d1987bc5322f0815ba085f477746dfcc43dacc625bf08ea8ac7