Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 11:37
Behavioral task
behavioral1
Sample
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe
-
Size
48KB
-
MD5
177f14ed35b25dcf4ffbcd1f021fb676
-
SHA1
ae362ea9477cdf633ee9b76b876be73c1e2a389c
-
SHA256
8100783372daa78409859d33e26e64dd2a34fb7f945426b83b25f06e3c09a625
-
SHA512
7ba8acf7c05f0dfb5c466a976343829d82560209f892a0b743b941eba5ca22aa022920b577d485f98047ed234ae991b6c3a7deca36b2cfcad4764dd9c7431111
-
SSDEEP
768:Xynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67GhPA2:Ib1MsHz3JDwhyWr+N95OTga6r2
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\csrss\Parameters\ServiceDll = "C:\\Windows\\system32\\240595812.dll" 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exesvchost.exepid Process 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe 4292 svchost.exe -
Creates a Windows Service
-
Drops file in System32 directory 3 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exesvchost.exedescription ioc Process File created C:\Windows\SysWOW64\240595812.dll 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe File created C:\Windows\SysWOW64\csrss.exe svchost.exe File opened for modification C:\Windows\SysWOW64\csrss.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exepid Process 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exedescription pid Process Token: SeIncBasePriorityPrivilege 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exepid Process 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.execmd.exedescription pid Process procid_target PID 4136 wrote to memory of 2684 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe 85 PID 4136 wrote to memory of 2684 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe 85 PID 4136 wrote to memory of 2684 4136 177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe 85 PID 2684 wrote to memory of 4544 2684 cmd.exe 87 PID 2684 wrote to memory of 4544 2684 cmd.exe 87 PID 2684 wrote to memory of 4544 2684 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\177f14ed35b25dcf4ffbcd1f021fb676_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:4544
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "csrss"1⤵PID:5096
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "csrss"1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5e15e36ac073f290b42b612e0cb50232f
SHA129ffa1fc5c1c0266a41a4d35cc1011c3bb224c84
SHA2566a14fdbcee2e2292fdad61e69359751979c737c5bc919f6818b47925a4f420e2
SHA51270159af6d56483594bc993d9b69a7312c74a20c8a33d69c8fab63d0a0d05daa3e3fe0277fe8b045522e2457a10c6aaff08a0c6c7dc2f65dca2061221d0b6b2aa
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641