Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe
-
Size
410KB
-
MD5
cb86d48add453c7e44dad0251f4871f4
-
SHA1
2a73389bcf7cd067ddaf779d0c4a725ddd124587
-
SHA256
5fceb8a7c93f908e2233c6442e1a8f46f1b027c5730a19228009ded2e3a91db0
-
SHA512
9734434c09ebf6dad40ff1132ad0b7363df470a4a4f91486b8467790b4b751eaf5ba97d3a98d0b18d427de9af2b4a7f9e43acb10f076df9e80b708f4371cb9ef
-
SSDEEP
6144:vXiSt30YkYp58nrzLUbeqYzzBYNYH3VQA5bUHUqVOiQe//o6x6v3xq2rj:/iY30YTz2LacLlhaUMpwN1rj
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2412 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82b7a32463b8663d821334e42891bd45 = "\"C:\\ProgramData\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\82b7a32463b8663d821334e42891bd45 = "\"C:\\ProgramData\\svchost.exe\" .." svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2176 1852 cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe 105 PID 1852 wrote to memory of 2176 1852 cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe 105 PID 1852 wrote to memory of 2176 1852 cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe 105 PID 2176 wrote to memory of 2412 2176 svchost.exe 108 PID 2176 wrote to memory of 2412 2176 svchost.exe 108 PID 2176 wrote to memory of 2412 2176 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb86d48add453c7e44dad0251f4871f4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2412
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4248 --field-trial-handle=2224,i,17688331074622862378,73816879873678745,262144 --variations-seed-version /prefetch:81⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD5cb86d48add453c7e44dad0251f4871f4
SHA12a73389bcf7cd067ddaf779d0c4a725ddd124587
SHA2565fceb8a7c93f908e2233c6442e1a8f46f1b027c5730a19228009ded2e3a91db0
SHA5129734434c09ebf6dad40ff1132ad0b7363df470a4a4f91486b8467790b4b751eaf5ba97d3a98d0b18d427de9af2b4a7f9e43acb10f076df9e80b708f4371cb9ef