Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe
-
Size
376KB
-
MD5
03634bab3d180c8eb1166b08d54243d1
-
SHA1
769dfe0edbefdd074e93082735c9974e1927f90d
-
SHA256
af50d226dc4186740fa44c453091ebe6416b0b65479eb4dd4193ae8b62b022af
-
SHA512
bbf34f1cab0f3723f60fe8372a97fbe9f594778e56082b2c9bbf63db6fc18d0d58d7233a79113c59117df60c8dbe0496bddf3f1a77c1208dfdb2371d78e7add6
-
SSDEEP
3072:45jhTJjYrXVh9M/Mm/dnujPAcLIG9diQRJXGGLEZ7LkJhJoNV1gn1DERLb4LjNcN:qC9M/MroQRupkdR4RL0Lj/aMhO
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List hidserv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe -
Executes dropped EXE 2 IoCs
pid Process 2212 hidserv.exe 2156 hidserv.exe -
Loads dropped DLL 3 IoCs
pid Process 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 2212 hidserv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\hidserv.exe" hidserv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2960 set thread context of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2212 set thread context of 2156 2212 hidserv.exe 30 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 2156 hidserv.exe 2156 hidserv.exe 2156 hidserv.exe 2156 hidserv.exe 2156 hidserv.exe 2156 hidserv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 2212 hidserv.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2636 2960 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 28 PID 2636 wrote to memory of 2212 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2212 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2212 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2212 2636 03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe 29 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30 PID 2212 wrote to memory of 2156 2212 hidserv.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\03634bab3d180c8eb1166b08d54243d1_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\hidserv.exe"C:\Users\Admin\AppData\Roaming\hidserv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\hidserv.exeC:\Users\Admin\AppData\Roaming\hidserv.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD503634bab3d180c8eb1166b08d54243d1
SHA1769dfe0edbefdd074e93082735c9974e1927f90d
SHA256af50d226dc4186740fa44c453091ebe6416b0b65479eb4dd4193ae8b62b022af
SHA512bbf34f1cab0f3723f60fe8372a97fbe9f594778e56082b2c9bbf63db6fc18d0d58d7233a79113c59117df60c8dbe0496bddf3f1a77c1208dfdb2371d78e7add6