Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe
-
Size
11.6MB
-
MD5
ff34e4dde4edddb6811d5823ad8d1ff6
-
SHA1
05e5557df156f030b9203c0f60cf946b74633c68
-
SHA256
d14d3e5af0dd958586eebcfbf7b085c2ced151b2fc190d2d3d3703d032b45019
-
SHA512
33e9770eff700d8544959c2d1caf171e37ac6f69ca9fffb066ec789cc8f2acff602607c692d1acca47d90881223544fb22b6f11aba51213eaeaf071f4582a729
-
SSDEEP
49152:kBvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvn:k
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3132 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wobjkrrt\ImagePath = "C:\\Windows\\SysWOW64\\wobjkrrt\\gygvdbfd.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4288 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
gygvdbfd.exepid process 4868 gygvdbfd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gygvdbfd.exedescription pid process target process PID 4868 set thread context of 4288 4868 gygvdbfd.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3372 sc.exe 2504 sc.exe 2844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4448 4884 WerFault.exe ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe 1944 4868 WerFault.exe gygvdbfd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exegygvdbfd.exedescription pid process target process PID 4884 wrote to memory of 4324 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 4324 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 4324 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 2920 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 2920 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 2920 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe cmd.exe PID 4884 wrote to memory of 3372 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 3372 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 3372 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2504 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2504 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2504 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2844 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2844 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 2844 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe sc.exe PID 4884 wrote to memory of 3132 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe netsh.exe PID 4884 wrote to memory of 3132 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe netsh.exe PID 4884 wrote to memory of 3132 4884 ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe netsh.exe PID 4868 wrote to memory of 4288 4868 gygvdbfd.exe svchost.exe PID 4868 wrote to memory of 4288 4868 gygvdbfd.exe svchost.exe PID 4868 wrote to memory of 4288 4868 gygvdbfd.exe svchost.exe PID 4868 wrote to memory of 4288 4868 gygvdbfd.exe svchost.exe PID 4868 wrote to memory of 4288 4868 gygvdbfd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wobjkrrt\2⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gygvdbfd.exe" C:\Windows\SysWOW64\wobjkrrt\2⤵PID:2920
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wobjkrrt binPath= "C:\Windows\SysWOW64\wobjkrrt\gygvdbfd.exe /d\"C:\Users\Admin\AppData\Local\Temp\ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3372 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wobjkrrt "wifi internet conection"2⤵
- Launches sc.exe
PID:2504 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wobjkrrt2⤵
- Launches sc.exe
PID:2844 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 12242⤵
- Program crash
PID:4448
-
C:\Windows\SysWOW64\wobjkrrt\gygvdbfd.exeC:\Windows\SysWOW64\wobjkrrt\gygvdbfd.exe /d"C:\Users\Admin\AppData\Local\Temp\ff34e4dde4edddb6811d5823ad8d1ff6_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 5362⤵
- Program crash
PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4884 -ip 48841⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4868 -ip 48681⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.1MB
MD57ed1afd314d2bde2d04b388f39d66880
SHA1b1040f8dae8061515a44a67c73e93481e1922243
SHA2565521cbd4b9d72b20e2404eeb4ccfc64b60d7bf715e04aea888c9c97b16366c41
SHA5127e6f267991c15dfc41dfeaf8957a63649991365ae7304e4cc30399061ebf59f3ce2f92db3284de5b33a735bd59de95302b54ef3a8188d4b1fa107e57f78aceed