Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 22:46
Behavioral task
behavioral1
Sample
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe
-
Size
911KB
-
MD5
09eb557b04c1816b27f2e7b77aa49c04
-
SHA1
9d15567404b0bfd2d2cb7c8125d8ecacd4597de9
-
SHA256
b3a9abdc95546324e5c97b29401fc2623f030799dcfb6ec46d8e62970ec36c6c
-
SHA512
18c7e4730d51c55fd51a3d089db7914079743fec4999d03d13f5163093eb18b214fb1e9f68ee83b5a336412f2399ee4d4a8632c726ba003587b6d700d95f913d
-
SSDEEP
12288:+8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1r/:LUKoN0bUxgGa/pfBHDb+y1L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe -
Processes:
iexplore.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 3028 msdcsc.exe -
Processes:
resource yara_rule behavioral2/memory/5116-0-0x0000000000400000-0x00000000004E5000-memory.dmp upx C:\Users\Admin\Documents\MSDCSC\msdcsc.exe upx behavioral2/memory/3028-15-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/5116-14-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/3028-18-0x0000000000400000-0x00000000004E5000-memory.dmp upx -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 3028 set thread context of 3772 3028 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSecurityPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeLoadDriverPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemProfilePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemtimePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeBackupPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeRestorePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeShutdownPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeDebugPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeUndockPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeManageVolumePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeImpersonatePrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 33 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 34 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 35 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: 36 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3028 msdcsc.exe Token: SeSecurityPrivilege 3028 msdcsc.exe Token: SeTakeOwnershipPrivilege 3028 msdcsc.exe Token: SeLoadDriverPrivilege 3028 msdcsc.exe Token: SeSystemProfilePrivilege 3028 msdcsc.exe Token: SeSystemtimePrivilege 3028 msdcsc.exe Token: SeProfSingleProcessPrivilege 3028 msdcsc.exe Token: SeIncBasePriorityPrivilege 3028 msdcsc.exe Token: SeCreatePagefilePrivilege 3028 msdcsc.exe Token: SeBackupPrivilege 3028 msdcsc.exe Token: SeRestorePrivilege 3028 msdcsc.exe Token: SeShutdownPrivilege 3028 msdcsc.exe Token: SeDebugPrivilege 3028 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3028 msdcsc.exe Token: SeChangeNotifyPrivilege 3028 msdcsc.exe Token: SeRemoteShutdownPrivilege 3028 msdcsc.exe Token: SeUndockPrivilege 3028 msdcsc.exe Token: SeManageVolumePrivilege 3028 msdcsc.exe Token: SeImpersonatePrivilege 3028 msdcsc.exe Token: SeCreateGlobalPrivilege 3028 msdcsc.exe Token: 33 3028 msdcsc.exe Token: 34 3028 msdcsc.exe Token: 35 3028 msdcsc.exe Token: 36 3028 msdcsc.exe Token: SeIncreaseQuotaPrivilege 3772 iexplore.exe Token: SeSecurityPrivilege 3772 iexplore.exe Token: SeTakeOwnershipPrivilege 3772 iexplore.exe Token: SeLoadDriverPrivilege 3772 iexplore.exe Token: SeSystemProfilePrivilege 3772 iexplore.exe Token: SeSystemtimePrivilege 3772 iexplore.exe Token: SeProfSingleProcessPrivilege 3772 iexplore.exe Token: SeIncBasePriorityPrivilege 3772 iexplore.exe Token: SeCreatePagefilePrivilege 3772 iexplore.exe Token: SeBackupPrivilege 3772 iexplore.exe Token: SeRestorePrivilege 3772 iexplore.exe Token: SeShutdownPrivilege 3772 iexplore.exe Token: SeDebugPrivilege 3772 iexplore.exe Token: SeSystemEnvironmentPrivilege 3772 iexplore.exe Token: SeChangeNotifyPrivilege 3772 iexplore.exe Token: SeRemoteShutdownPrivilege 3772 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 3772 iexplore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 5116 wrote to memory of 3028 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 5116 wrote to memory of 3028 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 5116 wrote to memory of 3028 5116 09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe msdcsc.exe PID 3028 wrote to memory of 3772 3028 msdcsc.exe iexplore.exe PID 3028 wrote to memory of 3772 3028 msdcsc.exe iexplore.exe PID 3028 wrote to memory of 3772 3028 msdcsc.exe iexplore.exe PID 3028 wrote to memory of 3772 3028 msdcsc.exe iexplore.exe PID 3028 wrote to memory of 3772 3028 msdcsc.exe iexplore.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09eb557b04c1816b27f2e7b77aa49c04_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies security service
- Windows security bypass
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
911KB
MD509eb557b04c1816b27f2e7b77aa49c04
SHA19d15567404b0bfd2d2cb7c8125d8ecacd4597de9
SHA256b3a9abdc95546324e5c97b29401fc2623f030799dcfb6ec46d8e62970ec36c6c
SHA51218c7e4730d51c55fd51a3d089db7914079743fec4999d03d13f5163093eb18b214fb1e9f68ee83b5a336412f2399ee4d4a8632c726ba003587b6d700d95f913d
-
memory/3028-15-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/3028-16-0x00000000023F0000-0x00000000023F1000-memory.dmpFilesize
4KB
-
memory/3028-18-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/5116-0-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/5116-1-0x00000000024E0000-0x00000000024E1000-memory.dmpFilesize
4KB
-
memory/5116-14-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB