Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe
-
Size
14.2MB
-
MD5
feddd618ad261223fa56a9a90c85b16d
-
SHA1
c52277afeab4974e09f04817d4312b19e62a7a4c
-
SHA256
2d9b24d71fc9718cc923f30729423817aa1c3547b27ff086e0d173d132932c7d
-
SHA512
af5071941f7508e01b6ef14a15bfdece43143af28d15f11d577cf0d544f67db626d9ddeff35f5dff2cbb194eec8e97debf670228c90c6807e50caca6eecda30c
-
SSDEEP
196608:CV8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY3:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3252 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qyiizrkk\ImagePath = "C:\\Windows\\SysWOW64\\qyiizrkk\\jtojaatz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 5056 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
jtojaatz.exepid process 4212 jtojaatz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jtojaatz.exedescription pid process target process PID 4212 set thread context of 5056 4212 jtojaatz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3516 sc.exe 428 sc.exe 3964 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3704 4792 WerFault.exe feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe 1900 4212 WerFault.exe jtojaatz.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exejtojaatz.exedescription pid process target process PID 4792 wrote to memory of 2612 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 2612 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 2612 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 3420 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 3420 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 3420 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe cmd.exe PID 4792 wrote to memory of 3516 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3516 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3516 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 428 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 428 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 428 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3964 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3964 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3964 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe sc.exe PID 4792 wrote to memory of 3252 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe netsh.exe PID 4792 wrote to memory of 3252 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe netsh.exe PID 4792 wrote to memory of 3252 4792 feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe netsh.exe PID 4212 wrote to memory of 5056 4212 jtojaatz.exe svchost.exe PID 4212 wrote to memory of 5056 4212 jtojaatz.exe svchost.exe PID 4212 wrote to memory of 5056 4212 jtojaatz.exe svchost.exe PID 4212 wrote to memory of 5056 4212 jtojaatz.exe svchost.exe PID 4212 wrote to memory of 5056 4212 jtojaatz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qyiizrkk\2⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jtojaatz.exe" C:\Windows\SysWOW64\qyiizrkk\2⤵PID:3420
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qyiizrkk binPath= "C:\Windows\SysWOW64\qyiizrkk\jtojaatz.exe /d\"C:\Users\Admin\AppData\Local\Temp\feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3516 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qyiizrkk "wifi internet conection"2⤵
- Launches sc.exe
PID:428 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qyiizrkk2⤵
- Launches sc.exe
PID:3964 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 11882⤵
- Program crash
PID:3704
-
C:\Windows\SysWOW64\qyiizrkk\jtojaatz.exeC:\Windows\SysWOW64\qyiizrkk\jtojaatz.exe /d"C:\Users\Admin\AppData\Local\Temp\feddd618ad261223fa56a9a90c85b16d_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 5122⤵
- Program crash
PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4792 -ip 47921⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4212 -ip 42121⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.6MB
MD527d3e4da9e31bd7bf08514c522920cf7
SHA1fcebc1c9c1e7ceb3e158e8abb26b6e707c5b3d46
SHA2565d509f204ac7126dfb7f1eda40d7785bff5547deca436a6257f0dfa2b33b76c1
SHA5122db00a0051162b9cdd7fac9871bd3ef279810d085f8b90b8b37337f4747e0363156fbe33b732b8b0a108ceb338d924defb10652c8f974b86540bbc5984d3e3c0