Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe
-
Size
404KB
-
MD5
db3c481f3eff1160e337e7971ef1d5dc
-
SHA1
233bca64d79acfabeeffeb028d8b0a011be38de2
-
SHA256
ae73ef74543ce177e7d376df37c9d497df69bdb3777a5e3efa5cc43205321414
-
SHA512
9754726b363c4ea7df6a7226f24357f1b82b727c159d6b58c902dc5fab53896aeca728a91795a7bede94ac1df22e4d90dbde5fdfe3cd27d94b4119ee7e0bff72
-
SSDEEP
6144:u9qlSqfb+6C82rv7pQsvKC1j7BQRyDo5Sv307a05LiSzt:u9qRfb+6C8A7p/z6ygEd05LiEt
Malware Config
Extracted
phorphiex
http://185.176.27.132/
1Bn4JYKoVgQpZ73doWVFSNZBbwKj3cpJNR
qqsagteh4m6qunmgrrknulafzcdlmzn35yeggvq8qk
Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i
D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M
0x05F916216CC4BA6ac89b8093d474E2a1e6121c63
LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7
t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z
Signatures
-
Processes:
sysnfin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sysnfin.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sysnfin.exe -
Phorphiex payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4496-2-0x0000000002230000-0x000000000223D000-memory.dmp family_phorphiex behavioral2/memory/4496-9-0x0000000002230000-0x000000000223D000-memory.dmp family_phorphiex behavioral2/memory/1892-13-0x0000000002050000-0x000000000205D000-memory.dmp family_phorphiex behavioral2/memory/1892-14-0x0000000002050000-0x000000000205D000-memory.dmp family_phorphiex -
Processes:
sysnfin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysnfin.exe -
Executes dropped EXE 1 IoCs
Processes:
sysnfin.exepid process 1892 sysnfin.exe -
Processes:
sysnfin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysnfin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysnfin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\494327524\\sysnfin.exe" db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\494327524\\sysnfin.exe" db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\494327524\sysnfin.exe db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe File opened for modification C:\Windows\494327524 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe File created C:\Windows\494327524\sysnfin.exe db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exesysnfin.exepid process 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe 1892 sysnfin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exesysnfin.exedescription pid process Token: SeDebugPrivilege 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe Token: SeDebugPrivilege 1892 sysnfin.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exesysnfin.exepid process 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe 1892 sysnfin.exe 1892 sysnfin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exedescription pid process target process PID 4496 wrote to memory of 1892 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe sysnfin.exe PID 4496 wrote to memory of 1892 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe sysnfin.exe PID 4496 wrote to memory of 1892 4496 db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe sysnfin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db3c481f3eff1160e337e7971ef1d5dc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\494327524\sysnfin.exeC:\Windows\494327524\sysnfin.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD5db3c481f3eff1160e337e7971ef1d5dc
SHA1233bca64d79acfabeeffeb028d8b0a011be38de2
SHA256ae73ef74543ce177e7d376df37c9d497df69bdb3777a5e3efa5cc43205321414
SHA5129754726b363c4ea7df6a7226f24357f1b82b727c159d6b58c902dc5fab53896aeca728a91795a7bede94ac1df22e4d90dbde5fdfe3cd27d94b4119ee7e0bff72