Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
-
Size
129KB
-
MD5
fe90d5dfa60dad355df93bd04bf6fa50
-
SHA1
c52a3f8818598932bb70916d7b9af3f10e2f2e08
-
SHA256
d646ecf9a3129198c6b1d832518fce34e093851c21e32c99353779c428da3833
-
SHA512
e635d45bb07311fcce15f60c7fdb77478b1cdf4af500d73379d2430a8a06d07432cb23b651bff5527a2b0abffe9046f2d67a726f841be99be36566bbd65aa5bf
-
SSDEEP
1536:dgb+dHlIFvviUq2VXtxOowiVdIyk4Xys4GTNKan4bFpb251VrGrT86Swnmio3+j4:BdSBv1xRIyk/ANK8IJ86QxoI/
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 7 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe:*:Enabled:Java Updater" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 2700 explorer.exe -
Loads dropped DLL 2 IoCs
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exepid process 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Java Updater = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2700 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 2700 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.execmd.execmd.execmd.exedescription pid process target process PID 2188 wrote to memory of 2508 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2508 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2508 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2508 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2100 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2100 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2100 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2100 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2556 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2556 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2556 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2188 wrote to memory of 2556 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 2508 wrote to memory of 2632 2508 cmd.exe reg.exe PID 2508 wrote to memory of 2632 2508 cmd.exe reg.exe PID 2508 wrote to memory of 2632 2508 cmd.exe reg.exe PID 2508 wrote to memory of 2632 2508 cmd.exe reg.exe PID 2100 wrote to memory of 2608 2100 cmd.exe reg.exe PID 2100 wrote to memory of 2608 2100 cmd.exe reg.exe PID 2100 wrote to memory of 2608 2100 cmd.exe reg.exe PID 2100 wrote to memory of 2608 2100 cmd.exe reg.exe PID 2556 wrote to memory of 2540 2556 cmd.exe reg.exe PID 2556 wrote to memory of 2540 2556 cmd.exe reg.exe PID 2556 wrote to memory of 2540 2556 cmd.exe reg.exe PID 2556 wrote to memory of 2540 2556 cmd.exe reg.exe PID 2188 wrote to memory of 2700 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe PID 2188 wrote to memory of 2700 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe PID 2188 wrote to memory of 2700 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe PID 2188 wrote to memory of 2700 2188 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v "FirewallDisableNotify" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v "FirewallDisableNotify" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Java Updater" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Java Updater" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\explorer.exeFilesize
129KB
MD5fe90d5dfa60dad355df93bd04bf6fa50
SHA1c52a3f8818598932bb70916d7b9af3f10e2f2e08
SHA256d646ecf9a3129198c6b1d832518fce34e093851c21e32c99353779c428da3833
SHA512e635d45bb07311fcce15f60c7fdb77478b1cdf4af500d73379d2430a8a06d07432cb23b651bff5527a2b0abffe9046f2d67a726f841be99be36566bbd65aa5bf
-
memory/2188-0-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB
-
memory/2188-1-0x0000000001E90000-0x0000000001ED0000-memory.dmpFilesize
256KB
-
memory/2188-2-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB
-
memory/2188-15-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB
-
memory/2700-16-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB
-
memory/2700-18-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB
-
memory/2700-17-0x00000000020F0000-0x0000000002130000-memory.dmpFilesize
256KB
-
memory/2700-19-0x0000000074530000-0x0000000074ADB000-memory.dmpFilesize
5.7MB