Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe
-
Size
84KB
-
MD5
ead1f7d573b4460944217f4030f22964
-
SHA1
2b9d6d4439bc1d9e47f9960472b97881f685fe85
-
SHA256
21f2eabbc51d9b7a7c33837fb35f9897b1102fd5361ba652efb5180433763140
-
SHA512
5604d7c6ed69bf803ae294226d49086eb655c74433b93bc1fd52f139092f3999d1271fb538c1b2d405968d3b2816be4e5c979fba62de30c1c09cc3fdc33f983e
-
SSDEEP
768:9nS+RC2/CiOBglMJx6kZjuTHbA8Y4uwdAb46B+CtOw+0GxTMlxTkjt3n7mBG:99SAlM7tju/4wdL8hOYG0ojtSQ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\7767969599757996844\winsvc.exe = "C:\\Users\\Admin\\7767969599757996844\\winsvc.exe:*:Enabled:Microsoft Windows Update" ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2664 winsvc.exe 2448 winsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Update = "C:\\Users\\Admin\\7767969599757996844\\winsvc.exe" ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1048 set thread context of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 2664 set thread context of 2448 2664 winsvc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 2664 winsvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 1048 wrote to memory of 3060 1048 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2664 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 29 PID 3060 wrote to memory of 2664 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 29 PID 3060 wrote to memory of 2664 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 29 PID 3060 wrote to memory of 2664 3060 ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30 PID 2664 wrote to memory of 2448 2664 winsvc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead1f7d573b4460944217f4030f22964_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\7767969599757996844\winsvc.exe"C:\Users\Admin\7767969599757996844\winsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\7767969599757996844\winsvc.exe"C:\Users\Admin\7767969599757996844\winsvc.exe"4⤵
- Executes dropped EXE
PID:2448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ead1f7d573b4460944217f4030f22964
SHA12b9d6d4439bc1d9e47f9960472b97881f685fe85
SHA25621f2eabbc51d9b7a7c33837fb35f9897b1102fd5361ba652efb5180433763140
SHA5125604d7c6ed69bf803ae294226d49086eb655c74433b93bc1fd52f139092f3999d1271fb538c1b2d405968d3b2816be4e5c979fba62de30c1c09cc3fdc33f983e