Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 01:56
Behavioral task
behavioral1
Sample
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe
-
Size
757KB
-
MD5
f007b11b6014d888d33b581c438bc296
-
SHA1
18fe4c3997b5730b3c0a375314be046903325817
-
SHA256
570985f06c6a51a2df7ff6706931807de298709e0083a56b38caf572635efec0
-
SHA512
58bc0f72616b8f918ffce1b50a858b50596784e8062860cceb4b9ac92103147f719729460b86c009ce6e404a073beb438d0880e97f23ce61fa66d66e609645b5
-
SSDEEP
12288:w9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKEqMd0QZh9u:2AQ6Zx9cxTmOrucTIEFSpOGVD0QZh9u
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" explorer.exe -
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 2600 notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exenotepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exedescription pid process target process PID 1932 set thread context of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2560 explorer.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exeexplorer.exedescription pid process Token: SeIncreaseQuotaPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeSecurityPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeSystemtimePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeBackupPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeRestorePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeShutdownPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeDebugPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeUndockPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeManageVolumePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeImpersonatePrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: 33 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: 34 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: 35 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2560 explorer.exe Token: SeSecurityPrivilege 2560 explorer.exe Token: SeTakeOwnershipPrivilege 2560 explorer.exe Token: SeLoadDriverPrivilege 2560 explorer.exe Token: SeSystemProfilePrivilege 2560 explorer.exe Token: SeSystemtimePrivilege 2560 explorer.exe Token: SeProfSingleProcessPrivilege 2560 explorer.exe Token: SeIncBasePriorityPrivilege 2560 explorer.exe Token: SeCreatePagefilePrivilege 2560 explorer.exe Token: SeBackupPrivilege 2560 explorer.exe Token: SeRestorePrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeDebugPrivilege 2560 explorer.exe Token: SeSystemEnvironmentPrivilege 2560 explorer.exe Token: SeChangeNotifyPrivilege 2560 explorer.exe Token: SeRemoteShutdownPrivilege 2560 explorer.exe Token: SeUndockPrivilege 2560 explorer.exe Token: SeManageVolumePrivilege 2560 explorer.exe Token: SeImpersonatePrivilege 2560 explorer.exe Token: SeCreateGlobalPrivilege 2560 explorer.exe Token: 33 2560 explorer.exe Token: 34 2560 explorer.exe Token: 35 2560 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f007b11b6014d888d33b581c438bc296_JaffaCakes118.exeexplorer.exedescription pid process target process PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 1220 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2560 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe explorer.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 1932 wrote to memory of 2600 1932 f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe PID 2560 wrote to memory of 2624 2560 explorer.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f007b11b6014d888d33b581c438bc296_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Adds Run key to start application
PID:1220 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe3⤵PID:2624
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe2⤵
- Deletes itself
PID:2600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD5f007b11b6014d888d33b581c438bc296
SHA118fe4c3997b5730b3c0a375314be046903325817
SHA256570985f06c6a51a2df7ff6706931807de298709e0083a56b38caf572635efec0
SHA51258bc0f72616b8f918ffce1b50a858b50596784e8062860cceb4b9ac92103147f719729460b86c009ce6e404a073beb438d0880e97f23ce61fa66d66e609645b5