Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe
-
Size
11.8MB
-
MD5
fff0aab4de88fa3503e16290699ea84b
-
SHA1
9b6879a810a5f8609898f8f552067a237b67912b
-
SHA256
5ff58c63e54e4bbbc6b4ec1aff3abb6275f8692a9f42a25dc9fcec70438a6bc6
-
SHA512
3587ec145d1503bc06673592da1feca0e9d9fae5c6a968f2ee3d0ad37559a132a789d3e43205921413c5159c8aeac8789a4af0234ba894f74a04e9c436711c6e
-
SSDEEP
98304:+NWUlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllx:MW
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2328 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
nvkobzii.exepid process 2688 nvkobzii.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
nvkobzii.exedescription pid process target process PID 2688 set thread context of 2416 2688 nvkobzii.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2812 sc.exe 3008 sc.exe 2732 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exenvkobzii.exedescription pid process target process PID 2324 wrote to memory of 2512 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2512 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2512 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2512 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2644 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2644 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2644 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2644 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe cmd.exe PID 2324 wrote to memory of 2812 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2812 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2812 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2812 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 3008 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 3008 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 3008 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 3008 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2732 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2732 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2732 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2732 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe sc.exe PID 2324 wrote to memory of 2328 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe netsh.exe PID 2324 wrote to memory of 2328 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe netsh.exe PID 2324 wrote to memory of 2328 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe netsh.exe PID 2324 wrote to memory of 2328 2324 fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe netsh.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe PID 2688 wrote to memory of 2416 2688 nvkobzii.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wpehvajt\2⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nvkobzii.exe" C:\Windows\SysWOW64\wpehvajt\2⤵PID:2644
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wpehvajt binPath= "C:\Windows\SysWOW64\wpehvajt\nvkobzii.exe /d\"C:\Users\Admin\AppData\Local\Temp\fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2812 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wpehvajt "wifi internet conection"2⤵
- Launches sc.exe
PID:3008 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wpehvajt2⤵
- Launches sc.exe
PID:2732 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2328
-
C:\Windows\SysWOW64\wpehvajt\nvkobzii.exeC:\Windows\SysWOW64\wpehvajt\nvkobzii.exe /d"C:\Users\Admin\AppData\Local\Temp\fff0aab4de88fa3503e16290699ea84b_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD5fff0aab4de88fa3503e16290699ea84b
SHA19b6879a810a5f8609898f8f552067a237b67912b
SHA2565ff58c63e54e4bbbc6b4ec1aff3abb6275f8692a9f42a25dc9fcec70438a6bc6
SHA5123587ec145d1503bc06673592da1feca0e9d9fae5c6a968f2ee3d0ad37559a132a789d3e43205921413c5159c8aeac8789a4af0234ba894f74a04e9c436711c6e