Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe
-
Size
445KB
-
MD5
034147d1a3607499ee9c0693c0148fb9
-
SHA1
1f9a645ad9276257dba97c7051794c20f2cfbd47
-
SHA256
ab4879d295dd56ac2e685a280ff70cf2c5831e7ccf63d2a8023df3bf7c9c6753
-
SHA512
cd3b482ca10b771833ead696e28b28281857b02a3728783af3f2b4a491a74ac86547bfb1e6cf85f9764fe2ea7958afb872df6fb96a730065e6e966527d8c6dfb
-
SSDEEP
6144:FiQmLudnQqoZSTipK1PRO8K4sJGDzCWDRHzSo04w98gWNlPTGQQm6agrd:cQBdnQqoGi81JSmzhlmo9NtTird
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 sc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\sc.exe = "C:\\Windows\\sc.exe" 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 sc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\GUOCYOKl.BAT 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe File created C:\Windows\sc.exe 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe File opened for modification C:\Windows\sc.exe 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2668 sc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe Token: SeDebugPrivilege 2668 sc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 sc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2668 sc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2668 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2668 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2668 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2668 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 28 PID 2668 wrote to memory of 2688 2668 sc.exe 29 PID 2668 wrote to memory of 2688 2668 sc.exe 29 PID 2668 wrote to memory of 2688 2668 sc.exe 29 PID 2668 wrote to memory of 2688 2668 sc.exe 29 PID 1672 wrote to memory of 2628 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2628 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2628 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2628 1672 034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\034147d1a3607499ee9c0693c0148fb9_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\sc.exeC:\Windows\sc.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\GUOCYOKl.BAT2⤵
- Deletes itself
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD59e576f20f04bbfb8c384c351b80f08d0
SHA1a5504c8de2d15470153900c26acc870bcfed7e0d
SHA2564e95d1ff0cb7654ccc097e7faae22f15dda9afd9ef778fb03a35c674176fbd4d
SHA5127421cb2dce44f05943cf22587214837d0e77e4ca417591dfda528bca12f86bc27d22dd3a95f3dadabbd3950c1ba1d1ce3241c6881a63facec2369874e79160d9
-
Filesize
445KB
MD5034147d1a3607499ee9c0693c0148fb9
SHA11f9a645ad9276257dba97c7051794c20f2cfbd47
SHA256ab4879d295dd56ac2e685a280ff70cf2c5831e7ccf63d2a8023df3bf7c9c6753
SHA512cd3b482ca10b771833ead696e28b28281857b02a3728783af3f2b4a491a74ac86547bfb1e6cf85f9764fe2ea7958afb872df6fb96a730065e6e966527d8c6dfb