Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe
-
Size
834KB
-
MD5
fd8dcad6006a5c4cf5e4cb1dd0f9ac63
-
SHA1
ae039707a732f19a22ebee2ced7a9bfa81562652
-
SHA256
61697ef43dd7466ae631f86542c02d1512b39d146dc21291e58274f8a22e5a22
-
SHA512
2e3a3520e68ccbf25199e9182590b7ab1664cc3fda980fb9131f0ef938c294c08d21acfb24635bbd8785a0548569dfc06679ed33d5cdc0aba86956f0562d83b8
-
SSDEEP
12288:AXoJ3pFAFuIqlJzyi7m1IxXT0vHwkx+CxkpZhEKRO30OVkc1+QFpr8U:Vn2QA1IXwvlxshEKRO3VT7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
isecurity.exepid process 2516 isecurity.exe -
Loads dropped DLL 3 IoCs
Processes:
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exepid process 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
isecurity.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
isecurity.exedescription ioc process File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\E: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
isecurity.exedescription ioc process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exeisecurity.exepid process 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exepid process 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
isecurity.exepid process 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
isecurity.exepid process 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe 2516 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
isecurity.exepid process 2516 isecurity.exe 2516 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exedescription pid process target process PID 1440 wrote to memory of 2516 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe isecurity.exe PID 1440 wrote to memory of 2516 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe isecurity.exe PID 1440 wrote to memory of 2516 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe isecurity.exe PID 1440 wrote to memory of 2516 1440 fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe isecurity.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd8dcad6006a5c4cf5e4cb1dd0f9ac63_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
830KB
MD5e84dc78f5fa1deb99fc7d7df4b8508b2
SHA1602c614e44896615e81a5dfd00cc36d67d857417
SHA256b59fdfd791fdcd70bb54870ecc2f48ff92949443e9680676874b454433c4c483
SHA51240731fb6a3c53d7a67ef7b502506e5c224bdc5cf52016d4b07df8e27b911998eab43654892ea3ef0c66c6c1de166fc711decfa7c348cc25dc80d9ef22ac31ff4