Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe
-
Size
142KB
-
MD5
91e150cf143714919e8f076e28ffa0af
-
SHA1
9f77919f92363378b6910acec411b1d4b8fce86b
-
SHA256
40ddfa5e9adf75169f553482db151abecf58134e1b80f2681f9528e85fb204c3
-
SHA512
9aad4f50d92d14914d872852939f75c903f892b9ab0d761ee6f4bcea92ca7109b411b2564562b80a876b90de2a92370c3ccc85874939e24b2a281828f4cdad8a
-
SSDEEP
3072:PO8/FLfgq6rzTkYfiL2+jKfgi4m5nuGFU6W6WNU6b37:N94zwFLnKP46uC
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\huulgpiv = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2524 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\huulgpiv\ImagePath = "C:\\Windows\\SysWOW64\\huulgpiv\\poypjhwi.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2672 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
poypjhwi.exepid process 2472 poypjhwi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
poypjhwi.exedescription pid process target process PID 2472 set thread context of 2672 2472 poypjhwi.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2828 sc.exe 2816 sc.exe 2152 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exepoypjhwi.exedescription pid process target process PID 2284 wrote to memory of 2972 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2972 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2972 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2972 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 3004 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 3004 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 3004 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 3004 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe cmd.exe PID 2284 wrote to memory of 2828 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2828 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2828 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2828 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2816 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2816 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2816 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2816 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2152 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2152 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2152 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2152 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe sc.exe PID 2284 wrote to memory of 2524 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe netsh.exe PID 2284 wrote to memory of 2524 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe netsh.exe PID 2284 wrote to memory of 2524 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe netsh.exe PID 2284 wrote to memory of 2524 2284 91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe netsh.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe PID 2472 wrote to memory of 2672 2472 poypjhwi.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\huulgpiv\2⤵PID:2972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\poypjhwi.exe" C:\Windows\SysWOW64\huulgpiv\2⤵PID:3004
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create huulgpiv binPath= "C:\Windows\SysWOW64\huulgpiv\poypjhwi.exe /d\"C:\Users\Admin\AppData\Local\Temp\91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description huulgpiv "wifi internet conection"2⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start huulgpiv2⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2524
-
-
C:\Windows\SysWOW64\huulgpiv\poypjhwi.exeC:\Windows\SysWOW64\huulgpiv\poypjhwi.exe /d"C:\Users\Admin\AppData\Local\Temp\91e150cf143714919e8f076e28ffa0af_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.2MB
MD539bc1100d3940ee21584098e89811423
SHA15a09920c9af40c3975f8aac3c4a589d32aa29fd7
SHA256eabec44835c76adb7f8c22ae113592dd9499256125f86b88fe5d8201ab2394c7
SHA5128ba261c7923b6f235063343eca6c6f2863c9eb6efd19388914c10e707fa7082121f5cff2cf289dd78e1cee051c586e2c24aab8c492cdf31e2900bb7d8c3dd53d