Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe
-
Size
12.2MB
-
MD5
04d88bfc300b49a0e992b3dbcd2354d8
-
SHA1
eef78b4bae9d140a932d3fcb570e1f90b961b521
-
SHA256
e5e6cb06a53338127e7bdd9d98203b2e4b736d5ad98da9e2db178a8a26582730
-
SHA512
29f0f4f897e7181d3956349d64c6e03ae441e35f597735d093f30134e08a89d46c398417c30359b1a263138f6d9645b80fde0206862669444431c149e77f0e79
-
SSDEEP
196608:nE/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvH:nE
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3028 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hohounka\ImagePath = "C:\\Windows\\SysWOW64\\hohounka\\bexfdfnx.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 892 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
bexfdfnx.exepid process 1184 bexfdfnx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bexfdfnx.exedescription pid process target process PID 1184 set thread context of 892 1184 bexfdfnx.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4128 sc.exe 3012 sc.exe 3488 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4804 4992 WerFault.exe 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe 3960 1184 WerFault.exe bexfdfnx.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exebexfdfnx.exedescription pid process target process PID 4992 wrote to memory of 4272 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 4272 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 4272 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 1356 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 1356 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 1356 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe cmd.exe PID 4992 wrote to memory of 4128 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 4128 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 4128 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3012 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3012 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3012 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3488 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3488 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3488 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe sc.exe PID 4992 wrote to memory of 3028 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe netsh.exe PID 4992 wrote to memory of 3028 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe netsh.exe PID 4992 wrote to memory of 3028 4992 04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe netsh.exe PID 1184 wrote to memory of 892 1184 bexfdfnx.exe svchost.exe PID 1184 wrote to memory of 892 1184 bexfdfnx.exe svchost.exe PID 1184 wrote to memory of 892 1184 bexfdfnx.exe svchost.exe PID 1184 wrote to memory of 892 1184 bexfdfnx.exe svchost.exe PID 1184 wrote to memory of 892 1184 bexfdfnx.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hohounka\2⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bexfdfnx.exe" C:\Windows\SysWOW64\hohounka\2⤵PID:1356
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hohounka binPath= "C:\Windows\SysWOW64\hohounka\bexfdfnx.exe /d\"C:\Users\Admin\AppData\Local\Temp\04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4128 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hohounka "wifi internet conection"2⤵
- Launches sc.exe
PID:3012 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hohounka2⤵
- Launches sc.exe
PID:3488 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 10442⤵
- Program crash
PID:4804
-
C:\Windows\SysWOW64\hohounka\bexfdfnx.exeC:\Windows\SysWOW64\hohounka\bexfdfnx.exe /d"C:\Users\Admin\AppData\Local\Temp\04d88bfc300b49a0e992b3dbcd2354d8_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 5202⤵
- Program crash
PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4992 -ip 49921⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1184 -ip 11841⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD56eca92c054859309e54b625142f66766
SHA184ee9cb8fe1b0ce203959f00dba65ba98fb6cf07
SHA2564766e20ad91f05f8429153767fe4a3923b785298021bc97cb71b506584d28010
SHA5120f1e4bd5d62da64e4bea0a2b2efe08c7354e7597418a6e6142084d36dbc0ece1fdddd83d3ece1685a4f471abbd92a4145ddee9f5905439448981854e0c483a67