Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe
-
Size
12.4MB
-
MD5
daa374c245a6a97a5f8c9f6dc178f6ea
-
SHA1
641a53f516c870ceb2c078482aec3cea8eca0937
-
SHA256
76354adc38ca087cde5e61c9249486df3d2d01939587740c0dbc836b97383ad7
-
SHA512
d9bbfe065875bd4f21419a94e50b632c82142527713f7b2098fba0a62ae033e9fe704c9cc66dd03a002c39b3c8ccbceaca15533d2ce5ed44aaa4f9da1e26f3e6
-
SSDEEP
393216:9YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYn:
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4164 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\pbnoikak\ImagePath = "C:\\Windows\\SysWOW64\\pbnoikak\\fvvvkbhz.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 4776 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
fvvvkbhz.exepid process 764 fvvvkbhz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fvvvkbhz.exedescription pid process target process PID 764 set thread context of 4776 764 fvvvkbhz.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1928 sc.exe 2136 sc.exe 1528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4528 3148 WerFault.exe daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe 3736 764 WerFault.exe fvvvkbhz.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exesc.exesc.exefvvvkbhz.exesvchost.exedaa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.execmd.exesc.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvvvkbhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exefvvvkbhz.exedescription pid process target process PID 3148 wrote to memory of 4836 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 4836 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 4836 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 2968 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 2968 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 2968 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe cmd.exe PID 3148 wrote to memory of 1928 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 1928 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 1928 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 2136 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 2136 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 2136 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 1528 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 1528 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 1528 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe sc.exe PID 3148 wrote to memory of 4164 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe netsh.exe PID 3148 wrote to memory of 4164 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe netsh.exe PID 3148 wrote to memory of 4164 3148 daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe netsh.exe PID 764 wrote to memory of 4776 764 fvvvkbhz.exe svchost.exe PID 764 wrote to memory of 4776 764 fvvvkbhz.exe svchost.exe PID 764 wrote to memory of 4776 764 fvvvkbhz.exe svchost.exe PID 764 wrote to memory of 4776 764 fvvvkbhz.exe svchost.exe PID 764 wrote to memory of 4776 764 fvvvkbhz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pbnoikak\2⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fvvvkbhz.exe" C:\Windows\SysWOW64\pbnoikak\2⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pbnoikak binPath= "C:\Windows\SysWOW64\pbnoikak\fvvvkbhz.exe /d\"C:\Users\Admin\AppData\Local\Temp\daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pbnoikak "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pbnoikak2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 6602⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\pbnoikak\fvvvkbhz.exeC:\Windows\SysWOW64\pbnoikak\fvvvkbhz.exe /d"C:\Users\Admin\AppData\Local\Temp\daa374c245a6a97a5f8c9f6dc178f6ea_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 5122⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3148 -ip 31481⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 764 -ip 7641⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.7MB
MD53452b3c9a247144577218c82ebc464c1
SHA11e132f92e328b640b98c9800dd270f188452d9ed
SHA2568ed46ecb7fdaca575c25b93361e3c0243ba634359715077e34b088700949c53f
SHA51222e36bc065dd0e3f0497b7aa266c5fe1c892bba2feb4f1ae0c01a80b039b40e75cab71867f9e8e3e4d06fd0985d04a15040b9a4c6fabd4e6401fd9d89df7cd2d