Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe
-
Size
321KB
-
MD5
6f6df11c0814860cc5a4fe7a9db87cc9
-
SHA1
539bbcc5ec63af4255a65e20ffb1352338cf41d2
-
SHA256
304a2a17f482efca5e8a9e59b7e17f0f7cbd3bce77680f72ef079a81eadab70c
-
SHA512
82bf7779e05bd6a734e51747f8fa8f879853c9869f88ecc0f7bf6bf13aeacdd47e7c506b9dde688c955c1f688f2889f8a8c92d263fcb411ec8663a43fe6ce31c
-
SSDEEP
6144:Fy9xbRMPI1qIELTUbTvfjstzx6UqUxaUWEN:Fwi
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2212-1-0x00000000011D0000-0x0000000001220000-memory.dmp disable_win_def -
Processes:
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\WinDefend\Start = "4" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription pid process target process PID 2212 set thread context of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exe6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exepid process 2320 powershell.exe 2028 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 2028 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 2028 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 2028 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe Token: SeDebugPrivilege 2028 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exedescription pid process target process PID 2212 wrote to memory of 2320 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe powershell.exe PID 2212 wrote to memory of 2320 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe powershell.exe PID 2212 wrote to memory of 2320 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe powershell.exe PID 2212 wrote to memory of 2320 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe powershell.exe PID 2212 wrote to memory of 2804 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe schtasks.exe PID 2212 wrote to memory of 2804 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe schtasks.exe PID 2212 wrote to memory of 2804 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe schtasks.exe PID 2212 wrote to memory of 2804 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe schtasks.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe PID 2212 wrote to memory of 2028 2212 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe 6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies security service
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f6df11c0814860cc5a4fe7a9db87cc9_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-