Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 21:17
Behavioral task
behavioral1
Sample
ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe
-
Size
510KB
-
MD5
ec030d3276115a3c890665b0725585f5
-
SHA1
5c7a2b3f748602f9c43b254e46b196eaab93d78e
-
SHA256
331a1d704573224a0efc415feaf7b3666d3739ea1a03d0af1248687f065e9b3d
-
SHA512
95af61fcd6ee514ff612283f69c182c6c89c0074b395374ada4a6cd110914a75da624c48b9d76009f68adc6fa985ef8b87b873a0a51a271c09ce8f4239fa3d42
-
SSDEEP
12288:4M7VEBOPLt0/mAz36UHcTNN6Fi4o7A7Epu4ETMWYtLdZUkN1Oa6BGm7:17VEUPe/mc85Vu7M1LWBp7
Malware Config
Extracted
latentbot
snaggelpuss123.zapto.org
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 MINECRAFT.EXE 1840 MINECRAFT.EXE -
Loads dropped DLL 4 IoCs
pid Process 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1936-0-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral1/memory/2952-4-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-2-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-7-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/1936-9-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral1/memory/2952-10-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-11-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-12-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-70-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-71-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-73-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/2952-81-0x0000000013140000-0x000000001326F000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSecurityPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemtimePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeBackupPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeRestorePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeShutdownPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeDebugPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeUndockPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeManageVolumePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeImpersonatePrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 33 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 34 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 35 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2952 1936 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 28 PID 2952 wrote to memory of 2532 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 29 PID 2952 wrote to memory of 2532 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 29 PID 2952 wrote to memory of 2532 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 29 PID 2952 wrote to memory of 2532 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2584 2532 MINECRAFT.EXE 30 PID 2532 wrote to memory of 2584 2532 MINECRAFT.EXE 30 PID 2532 wrote to memory of 2584 2532 MINECRAFT.EXE 30 PID 2532 wrote to memory of 2584 2532 MINECRAFT.EXE 30 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2556 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 2952 wrote to memory of 1840 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1840 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1840 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1840 2952 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 33 PID 1840 wrote to memory of 812 1840 MINECRAFT.EXE 34 PID 1840 wrote to memory of 812 1840 MINECRAFT.EXE 34 PID 1840 wrote to memory of 812 1840 MINECRAFT.EXE 34 PID 1840 wrote to memory of 812 1840 MINECRAFT.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xms512m -Xmx1024m -jar "C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"4⤵PID:2584
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe3⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xms512m -Xmx1024m -jar "C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"4⤵PID:812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD50f1931e26c21219db1c90e90037f11f6
SHA174b65f7fb7fa197d413ba5bc45cf10304deb4ecc
SHA256f4d54e35b857b5dfbca6fefcff5ab5599ce30b62eef7deded6594c5be93d25c3
SHA5120c6a90034e5852915af61ccc091568cb636f583d4c4b5cca8bfc3f7f86bbf6a79f16c324d723c1d3968d7996071bb85a79cd6fde682bb4bfeedfd770b7b8e817