Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe
-
Size
10.4MB
-
MD5
02ee7e829fc9d96448059a4ac56a7d91
-
SHA1
7685d37ff675095c57a4c0885d4ce83c2399eee6
-
SHA256
4bffe2b9bd86fef9e9dc978c0b66a5ed3b5fe89fbcbc7fc89e77360be9a6fae8
-
SHA512
6e0d134641aaa622e19451f37d74085a80c4e76c47aa5e04b45cc0eb30a7832f8d582516d8655c62dc79df5010e55e00fa79b744a2a8826f1220d43c8163baa5
-
SSDEEP
196608:nmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmD:nmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmD
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1348 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qudlelod\ImagePath = "C:\\Windows\\SysWOW64\\qudlelod\\kpldbeq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1084 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
kpldbeq.exepid process 4396 kpldbeq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kpldbeq.exedescription pid process target process PID 4396 set thread context of 1084 4396 kpldbeq.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1972 sc.exe 1828 sc.exe 3924 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4472 4604 WerFault.exe 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe 2060 4396 WerFault.exe kpldbeq.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.execmd.exesc.exekpldbeq.exesvchost.execmd.exesc.exesc.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpldbeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exekpldbeq.exedescription pid process target process PID 4604 wrote to memory of 932 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 932 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 932 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 4568 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 4568 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 4568 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe cmd.exe PID 4604 wrote to memory of 1972 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1972 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1972 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1828 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1828 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1828 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 3924 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 3924 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 3924 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe sc.exe PID 4604 wrote to memory of 1348 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe netsh.exe PID 4604 wrote to memory of 1348 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe netsh.exe PID 4604 wrote to memory of 1348 4604 02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe netsh.exe PID 4396 wrote to memory of 1084 4396 kpldbeq.exe svchost.exe PID 4396 wrote to memory of 1084 4396 kpldbeq.exe svchost.exe PID 4396 wrote to memory of 1084 4396 kpldbeq.exe svchost.exe PID 4396 wrote to memory of 1084 4396 kpldbeq.exe svchost.exe PID 4396 wrote to memory of 1084 4396 kpldbeq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qudlelod\2⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kpldbeq.exe" C:\Windows\SysWOW64\qudlelod\2⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qudlelod binPath= "C:\Windows\SysWOW64\qudlelod\kpldbeq.exe /d\"C:\Users\Admin\AppData\Local\Temp\02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qudlelod "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qudlelod2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3924
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 12242⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\qudlelod\kpldbeq.exeC:\Windows\SysWOW64\qudlelod\kpldbeq.exe /d"C:\Users\Admin\AppData\Local\Temp\02ee7e829fc9d96448059a4ac56a7d91_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 5082⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4604 -ip 46041⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4396 -ip 43961⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5ac3be45316d43bc75526aa27f4ea349c
SHA1778923852d7d9e59933656e7830485a31e1773bf
SHA2564032eaa2decd64811f08291067dba0ccaf46ae1a05d891065036e2d62ae50b6d
SHA51275918e68c59fcc5bacb257ef6ffe70f57f2e7257cd2ebe8646ee411f277fcabb38b4469011bb52d4603b5b988db46b23a938276a5bef39e57749275f9844aefc