Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 22:46
Behavioral task
behavioral1
Sample
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe
-
Size
911KB
-
MD5
09eb557b04c1816b27f2e7b77aa49c04
-
SHA1
9d15567404b0bfd2d2cb7c8125d8ecacd4597de9
-
SHA256
b3a9abdc95546324e5c97b29401fc2623f030799dcfb6ec46d8e62970ec36c6c
-
SHA512
18c7e4730d51c55fd51a3d089db7914079743fec4999d03d13f5163093eb18b214fb1e9f68ee83b5a336412f2399ee4d4a8632c726ba003587b6d700d95f913d
-
SSDEEP
12288:+8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1r/:LUKoN0bUxgGa/pfBHDb+y1L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2176 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exepid process 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/1304-0-0x0000000000400000-0x00000000004E5000-memory.dmp upx \Users\Admin\Documents\MSDCSC\msdcsc.exe upx behavioral1/memory/1304-13-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2176-14-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2176-18-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral1/memory/2608-17-0x0000000000400000-0x00000000004E5000-memory.dmp upx -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2176 set thread context of 2608 2176 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSecurityPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemtimePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeBackupPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeRestorePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeShutdownPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeDebugPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeUndockPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeManageVolumePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeImpersonatePrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 33 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 34 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 35 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2176 msdcsc.exe Token: SeSecurityPrivilege 2176 msdcsc.exe Token: SeTakeOwnershipPrivilege 2176 msdcsc.exe Token: SeLoadDriverPrivilege 2176 msdcsc.exe Token: SeSystemProfilePrivilege 2176 msdcsc.exe Token: SeSystemtimePrivilege 2176 msdcsc.exe Token: SeProfSingleProcessPrivilege 2176 msdcsc.exe Token: SeIncBasePriorityPrivilege 2176 msdcsc.exe Token: SeCreatePagefilePrivilege 2176 msdcsc.exe Token: SeBackupPrivilege 2176 msdcsc.exe Token: SeRestorePrivilege 2176 msdcsc.exe Token: SeShutdownPrivilege 2176 msdcsc.exe Token: SeDebugPrivilege 2176 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2176 msdcsc.exe Token: SeChangeNotifyPrivilege 2176 msdcsc.exe Token: SeRemoteShutdownPrivilege 2176 msdcsc.exe Token: SeUndockPrivilege 2176 msdcsc.exe Token: SeManageVolumePrivilege 2176 msdcsc.exe Token: SeImpersonatePrivilege 2176 msdcsc.exe Token: SeCreateGlobalPrivilege 2176 msdcsc.exe Token: 33 2176 msdcsc.exe Token: 34 2176 msdcsc.exe Token: 35 2176 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2608 iexplore.exe Token: SeSecurityPrivilege 2608 iexplore.exe Token: SeTakeOwnershipPrivilege 2608 iexplore.exe Token: SeLoadDriverPrivilege 2608 iexplore.exe Token: SeSystemProfilePrivilege 2608 iexplore.exe Token: SeSystemtimePrivilege 2608 iexplore.exe Token: SeProfSingleProcessPrivilege 2608 iexplore.exe Token: SeIncBasePriorityPrivilege 2608 iexplore.exe Token: SeCreatePagefilePrivilege 2608 iexplore.exe Token: SeBackupPrivilege 2608 iexplore.exe Token: SeRestorePrivilege 2608 iexplore.exe Token: SeShutdownPrivilege 2608 iexplore.exe Token: SeDebugPrivilege 2608 iexplore.exe Token: SeSystemEnvironmentPrivilege 2608 iexplore.exe Token: SeChangeNotifyPrivilege 2608 iexplore.exe Token: SeRemoteShutdownPrivilege 2608 iexplore.exe Token: SeUndockPrivilege 2608 iexplore.exe Token: SeManageVolumePrivilege 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2608 iexplore.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 1304 wrote to memory of 2176 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 1304 wrote to memory of 2176 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 1304 wrote to memory of 2176 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 1304 wrote to memory of 2176 1304 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe PID 2176 wrote to memory of 2608 2176 msdcsc.exe iexplore.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies security service
- Windows security bypass
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
911KB
MD509eb557b04c1816b27f2e7b77aa49c04
SHA19d15567404b0bfd2d2cb7c8125d8ecacd4597de9
SHA256b3a9abdc95546324e5c97b29401fc2623f030799dcfb6ec46d8e62970ec36c6c
SHA51218c7e4730d51c55fd51a3d089db7914079743fec4999d03d13f5163093eb18b214fb1e9f68ee83b5a336412f2399ee4d4a8632c726ba003587b6d700d95f913d
-
memory/1304-0-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/1304-1-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1304-12-0x0000000003810000-0x00000000038F5000-memory.dmpFilesize
916KB
-
memory/1304-13-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2176-15-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2176-14-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2176-18-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/2608-17-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB