Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe
-
Size
11.6MB
-
MD5
a74b062af7d84cd58eb2edb84bdda27f
-
SHA1
49883834e828cf4020279c8253c4780f078dd9c9
-
SHA256
e52157c37dbd0ab18fc824ce8ddd986264d6366b6bea691624961fbfc4893b69
-
SHA512
dedca1622ed514fa840e0f1c066c5bed9256a8112d3eba3eab82458d19da97b2c7625164179f8b6b82bdeb087d6be64b103665469a4e55dbaa3a64efd455e2b0
-
SSDEEP
24576:fW93OTI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tI1/tIZ:u
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\fmyvtwtu = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2868 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fmyvtwtu\ImagePath = "C:\\Windows\\SysWOW64\\fmyvtwtu\\fibjhjrb.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2304 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 fibjhjrb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 2304 2732 fibjhjrb.exe 44 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2788 sc.exe 2644 sc.exe 2740 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fibjhjrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2932 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2932 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2932 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2932 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2416 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 33 PID 2060 wrote to memory of 2416 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 33 PID 2060 wrote to memory of 2416 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 33 PID 2060 wrote to memory of 2416 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 33 PID 2060 wrote to memory of 2788 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 35 PID 2060 wrote to memory of 2788 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 35 PID 2060 wrote to memory of 2788 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 35 PID 2060 wrote to memory of 2788 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 35 PID 2060 wrote to memory of 2644 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 37 PID 2060 wrote to memory of 2644 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 37 PID 2060 wrote to memory of 2644 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 37 PID 2060 wrote to memory of 2644 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 37 PID 2060 wrote to memory of 2740 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 39 PID 2060 wrote to memory of 2740 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 39 PID 2060 wrote to memory of 2740 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 39 PID 2060 wrote to memory of 2740 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 39 PID 2060 wrote to memory of 2868 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 42 PID 2060 wrote to memory of 2868 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 42 PID 2060 wrote to memory of 2868 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 42 PID 2060 wrote to memory of 2868 2060 a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe 42 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44 PID 2732 wrote to memory of 2304 2732 fibjhjrb.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fmyvtwtu\2⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fibjhjrb.exe" C:\Windows\SysWOW64\fmyvtwtu\2⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fmyvtwtu binPath= "C:\Windows\SysWOW64\fmyvtwtu\fibjhjrb.exe /d\"C:\Users\Admin\AppData\Local\Temp\a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fmyvtwtu "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fmyvtwtu2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\fmyvtwtu\fibjhjrb.exeC:\Windows\SysWOW64\fmyvtwtu\fibjhjrb.exe /d"C:\Users\Admin\AppData\Local\Temp\a74b062af7d84cd58eb2edb84bdda27f_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD5ebc683f6378385b4eb31dcd5ecd957e6
SHA17d28af45687e543260506ed08e5a6906fb1cb38e
SHA256f59d237bd3e086b1915df8cd7d2a473a2f398873a0d5cc64f974d706e0f0dbd5
SHA512df97975eae15b1a66a90824a42325bce4af74bb3078e307a98e7512d29283a399f3f3a7e002985f0b70896e176234d0a763e3ba2ce711ce787d1833087664e3f