Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe
-
Size
263KB
-
MD5
47f7499a4be2f2bca257ec130a29c799
-
SHA1
cbc60f99cb19c72c50d2a30adcc076ea29c43415
-
SHA256
7a8aec1488799c958cf0ce303cdb68ff66ef92402e1d3f748ea1c2ae0e981af8
-
SHA512
5f154f95c37d273548d3e3a1b95f1b46a910e1b1e98d5bb1178f2fec9058895a62e3f0376950e343a842a864c2a1e9eb2f1a72a534a41352e6671cf903e1f61f
-
SSDEEP
6144:3QSKph/WvuGSEP72hDKp0gKq4IT6Odt+q7Q2GOSMfc9x7:3PUdWvuGSEP72hY0gKI6s/1JI
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3504 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vdsmmnbt\ImagePath = "C:\\Windows\\SysWOW64\\vdsmmnbt\\ysblybgs.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 5056 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 ysblybgs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 5056 4912 ysblybgs.exe 104 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4192 sc.exe 4028 sc.exe 4340 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3124 212 WerFault.exe 83 964 4912 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysblybgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 212 wrote to memory of 2656 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 87 PID 212 wrote to memory of 2656 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 87 PID 212 wrote to memory of 2656 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 87 PID 212 wrote to memory of 3408 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 89 PID 212 wrote to memory of 3408 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 89 PID 212 wrote to memory of 3408 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 89 PID 212 wrote to memory of 4192 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 91 PID 212 wrote to memory of 4192 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 91 PID 212 wrote to memory of 4192 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 91 PID 212 wrote to memory of 4028 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 93 PID 212 wrote to memory of 4028 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 93 PID 212 wrote to memory of 4028 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 93 PID 212 wrote to memory of 4340 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 95 PID 212 wrote to memory of 4340 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 95 PID 212 wrote to memory of 4340 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 95 PID 212 wrote to memory of 3504 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 100 PID 212 wrote to memory of 3504 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 100 PID 212 wrote to memory of 3504 212 47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe 100 PID 4912 wrote to memory of 5056 4912 ysblybgs.exe 104 PID 4912 wrote to memory of 5056 4912 ysblybgs.exe 104 PID 4912 wrote to memory of 5056 4912 ysblybgs.exe 104 PID 4912 wrote to memory of 5056 4912 ysblybgs.exe 104 PID 4912 wrote to memory of 5056 4912 ysblybgs.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vdsmmnbt\2⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ysblybgs.exe" C:\Windows\SysWOW64\vdsmmnbt\2⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vdsmmnbt binPath= "C:\Windows\SysWOW64\vdsmmnbt\ysblybgs.exe /d\"C:\Users\Admin\AppData\Local\Temp\47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vdsmmnbt "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vdsmmnbt2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 11642⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\vdsmmnbt\ysblybgs.exeC:\Windows\SysWOW64\vdsmmnbt\ysblybgs.exe /d"C:\Users\Admin\AppData\Local\Temp\47f7499a4be2f2bca257ec130a29c799_JaffaCakes118.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 5082⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 212 -ip 2121⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4912 -ip 49121⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.1MB
MD597f7349197a527096e640b36814299d0
SHA1bc07dbcc2a7ae9acd62538d22d33b540c8e35b3c
SHA2565d167de798126715399622d68979993724eedf98b96c9b0615fa1f3afa169f1c
SHA51237cfbca127d85330f6bc81e604dac201d3e5fe5bd39430af3b45df53794ebe9fd13f5ba99a915470addfd44d804c7896297f2d1b3b172e785c0d3c7a38d2dac9