Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe
-
Size
14.2MB
-
MD5
2c0c2678b5b28f3ea907ca453c439cff
-
SHA1
42d910a108e92d204b54a6f69b224ad20b144872
-
SHA256
326afe31d4029fd6bb8221319ea23a52d145c9f1f4f85bdcad3ae9b4318adb4f
-
SHA512
30590b294e4c17b37214edc4f798a63fb994a8538eb40e7d9705302eece5d3f785c8d7de1eaf4bb83694652589b69d17da0970e4bd0324a2621a068cc1042e65
-
SSDEEP
49152:A1yvllllllllllllllllllllllllllllllllllllllllllllllllllllllllllln:AA
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ubenhnbq = "0" svchost.exe -
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2804 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ubenhnbq\ImagePath = "C:\\Windows\\SysWOW64\\ubenhnbq\\hygeojqe.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2664 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 hygeojqe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2664 2752 hygeojqe.exe 44 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1788 sc.exe 2640 sc.exe 2656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hygeojqe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3004 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 31 PID 2316 wrote to memory of 3004 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 31 PID 2316 wrote to memory of 3004 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 31 PID 2316 wrote to memory of 3004 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 31 PID 2316 wrote to memory of 1780 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1780 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1780 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1780 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1788 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 35 PID 2316 wrote to memory of 1788 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 35 PID 2316 wrote to memory of 1788 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 35 PID 2316 wrote to memory of 1788 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 35 PID 2316 wrote to memory of 2640 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 37 PID 2316 wrote to memory of 2640 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 37 PID 2316 wrote to memory of 2640 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 37 PID 2316 wrote to memory of 2640 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 37 PID 2316 wrote to memory of 2656 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2656 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2656 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2656 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2804 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 42 PID 2316 wrote to memory of 2804 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 42 PID 2316 wrote to memory of 2804 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 42 PID 2316 wrote to memory of 2804 2316 2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe 42 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44 PID 2752 wrote to memory of 2664 2752 hygeojqe.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ubenhnbq\2⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hygeojqe.exe" C:\Windows\SysWOW64\ubenhnbq\2⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ubenhnbq binPath= "C:\Windows\SysWOW64\ubenhnbq\hygeojqe.exe /d\"C:\Users\Admin\AppData\Local\Temp\2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ubenhnbq "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ubenhnbq2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\ubenhnbq\hygeojqe.exeC:\Windows\SysWOW64\ubenhnbq\hygeojqe.exe /d"C:\Users\Admin\AppData\Local\Temp\2c0c2678b5b28f3ea907ca453c439cff_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.1MB
MD5e22cc4bcdddcc248bd5075a51e06a8df
SHA11d01eb6b459e4020d1e6a58f26a44056927cab63
SHA25684ce35842e933faa39fd9324730eaab1c899a2a71be6f0d8f8495022e3b3987a
SHA512765c5943cfa718c10bcac9603b0d6ae2cb0b8cdef0a59b44fcc762841fe90a4497b181bddcd4033916e29658ed8296394368ef1ee106da87fa6ae6d9237c1033