Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe
-
Size
142KB
-
MD5
77dd2e67ae3a0d69f2c7b8d8619e9d9d
-
SHA1
4736ebc4bcc6dea80889ca46575a0d9d10ee05f9
-
SHA256
c980f397ea8ed1320a3cb81a5e347bd60794bd54e2d7348aee8a7adea1b1beb4
-
SHA512
deb8ad9fd4693cb01d158a416105345c8a6e62690654bacfcc49947a684c87167618d1bfec1df83701d4e388ad00490771bf3ed47cc5d953b167fd0c6cbf2b5c
-
SSDEEP
3072:y9Tpm/Wn628w6rzTkYfiL2+jKfgi4m5nuGFU6W6WN06QUj:teizwFLnKP46uC2
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4904 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\lwnqfbta\ImagePath = "C:\\Windows\\SysWOW64\\lwnqfbta\\hgqhbzoa.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4508 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
hgqhbzoa.exepid process 4924 hgqhbzoa.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hgqhbzoa.exedescription pid process target process PID 4924 set thread context of 4508 4924 hgqhbzoa.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1544 sc.exe 3508 sc.exe 412 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exehgqhbzoa.exedescription pid process target process PID 4736 wrote to memory of 1760 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 1760 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 1760 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 1088 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 1088 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 1088 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe cmd.exe PID 4736 wrote to memory of 412 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 412 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 412 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 1544 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 1544 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 1544 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 3508 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 3508 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 3508 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe sc.exe PID 4736 wrote to memory of 4904 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe netsh.exe PID 4736 wrote to memory of 4904 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe netsh.exe PID 4736 wrote to memory of 4904 4736 77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe netsh.exe PID 4924 wrote to memory of 4508 4924 hgqhbzoa.exe svchost.exe PID 4924 wrote to memory of 4508 4924 hgqhbzoa.exe svchost.exe PID 4924 wrote to memory of 4508 4924 hgqhbzoa.exe svchost.exe PID 4924 wrote to memory of 4508 4924 hgqhbzoa.exe svchost.exe PID 4924 wrote to memory of 4508 4924 hgqhbzoa.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lwnqfbta\2⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hgqhbzoa.exe" C:\Windows\SysWOW64\lwnqfbta\2⤵PID:1088
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lwnqfbta binPath= "C:\Windows\SysWOW64\lwnqfbta\hgqhbzoa.exe /d\"C:\Users\Admin\AppData\Local\Temp\77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:412
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lwnqfbta "wifi internet conection"2⤵
- Launches sc.exe
PID:1544
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lwnqfbta2⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4904
-
-
C:\Windows\SysWOW64\lwnqfbta\hgqhbzoa.exeC:\Windows\SysWOW64\lwnqfbta\hgqhbzoa.exe /d"C:\Users\Admin\AppData\Local\Temp\77dd2e67ae3a0d69f2c7b8d8619e9d9d_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4508
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.6MB
MD575cf8ed0107282e61eb029e501dddc70
SHA191555ca95b94671ec9f9bedf323f7313d3d6ffdf
SHA2564867571d447cd49dace320b07f5c4ad45cde1b89e88497d35e2b92bacf1afc90
SHA5125bcb1809cfce4958ecb8c32fde4961bd8581ae73c2990f2ae225d74ecfafbcb665214495eaa626212ef7a44c1d9f03ee7b6d2c4efc9bd8123d8c014f41220f59