Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 06:12
Behavioral task
behavioral1
Sample
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
-
Size
693KB
-
MD5
0387bac0c095a5d24fea2bcabdcd4748
-
SHA1
720be1352caf647d2df4fa8545933474e84efc4f
-
SHA256
4c3273a1f018603e24b1caf53284c226fc8ef5ef0ced232605fe0e22e8f3a27b
-
SHA512
efa46fca5e86e2be32ef2f12db6f9b1af2c84b0e0e6df8e593fd50eaf4aa97e53b600622b763dd8e47797a3977e2123eb9f1aa6c23001c85513fb5a4f4cb9715
-
SSDEEP
12288:O8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixts:bUKoN0bUxgGa/pfBHDb+y1HgZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 3052 attrib.exe 3016 attrib.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2468 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exepid process 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exemsdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2468 set thread context of 2896 2468 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2896 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSecurityPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemtimePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeBackupPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeRestorePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeShutdownPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeDebugPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeUndockPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeManageVolumePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeImpersonatePrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 33 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 34 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 35 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2468 msdcsc.exe Token: SeSecurityPrivilege 2468 msdcsc.exe Token: SeTakeOwnershipPrivilege 2468 msdcsc.exe Token: SeLoadDriverPrivilege 2468 msdcsc.exe Token: SeSystemProfilePrivilege 2468 msdcsc.exe Token: SeSystemtimePrivilege 2468 msdcsc.exe Token: SeProfSingleProcessPrivilege 2468 msdcsc.exe Token: SeIncBasePriorityPrivilege 2468 msdcsc.exe Token: SeCreatePagefilePrivilege 2468 msdcsc.exe Token: SeBackupPrivilege 2468 msdcsc.exe Token: SeRestorePrivilege 2468 msdcsc.exe Token: SeShutdownPrivilege 2468 msdcsc.exe Token: SeDebugPrivilege 2468 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2468 msdcsc.exe Token: SeChangeNotifyPrivilege 2468 msdcsc.exe Token: SeRemoteShutdownPrivilege 2468 msdcsc.exe Token: SeUndockPrivilege 2468 msdcsc.exe Token: SeManageVolumePrivilege 2468 msdcsc.exe Token: SeImpersonatePrivilege 2468 msdcsc.exe Token: SeCreateGlobalPrivilege 2468 msdcsc.exe Token: 33 2468 msdcsc.exe Token: 34 2468 msdcsc.exe Token: 35 2468 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2896 iexplore.exe Token: SeSecurityPrivilege 2896 iexplore.exe Token: SeTakeOwnershipPrivilege 2896 iexplore.exe Token: SeLoadDriverPrivilege 2896 iexplore.exe Token: SeSystemProfilePrivilege 2896 iexplore.exe Token: SeSystemtimePrivilege 2896 iexplore.exe Token: SeProfSingleProcessPrivilege 2896 iexplore.exe Token: SeIncBasePriorityPrivilege 2896 iexplore.exe Token: SeCreatePagefilePrivilege 2896 iexplore.exe Token: SeBackupPrivilege 2896 iexplore.exe Token: SeRestorePrivilege 2896 iexplore.exe Token: SeShutdownPrivilege 2896 iexplore.exe Token: SeDebugPrivilege 2896 iexplore.exe Token: SeSystemEnvironmentPrivilege 2896 iexplore.exe Token: SeChangeNotifyPrivilege 2896 iexplore.exe Token: SeRemoteShutdownPrivilege 2896 iexplore.exe Token: SeUndockPrivilege 2896 iexplore.exe Token: SeManageVolumePrivilege 2896 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2272 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2896 iexplore.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.execmd.execmd.execmd.exemsdcsc.exedescription pid process target process PID 2740 wrote to memory of 1948 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 1948 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 1948 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 1948 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2940 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2940 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2940 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2940 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 1948 wrote to memory of 3016 1948 cmd.exe attrib.exe PID 1948 wrote to memory of 3016 1948 cmd.exe attrib.exe PID 1948 wrote to memory of 3016 1948 cmd.exe attrib.exe PID 1948 wrote to memory of 3016 1948 cmd.exe attrib.exe PID 2940 wrote to memory of 3052 2940 cmd.exe attrib.exe PID 2940 wrote to memory of 3052 2940 cmd.exe attrib.exe PID 2940 wrote to memory of 3052 2940 cmd.exe attrib.exe PID 2940 wrote to memory of 3052 2940 cmd.exe attrib.exe PID 2740 wrote to memory of 2464 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2464 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2464 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2740 wrote to memory of 2464 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2464 wrote to memory of 2340 2464 cmd.exe PING.EXE PID 2464 wrote to memory of 2340 2464 cmd.exe PING.EXE PID 2464 wrote to memory of 2340 2464 cmd.exe PING.EXE PID 2464 wrote to memory of 2340 2464 cmd.exe PING.EXE PID 2740 wrote to memory of 2468 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 2740 wrote to memory of 2468 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 2740 wrote to memory of 2468 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 2740 wrote to memory of 2468 2740 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe PID 2468 wrote to memory of 2896 2468 msdcsc.exe iexplore.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3016 attrib.exe 3052 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 43⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\546007_214083362036392_142826555828740_366804_1175103556_N.JPGFilesize
14KB
MD508df74237a10e2afce14e941b5a40fbc
SHA10c1bedc2c699bc0bb633a343728b4816f43b3a20
SHA2568ba4b0e6296fb9240c6a66cf9e815d7484e751abb0492cbb787d9e12afaab4c3
SHA512d3a64272812e58d52d45179a945c4260dcbe3950d0a835177da2a452e1bed1228330bd053230aa97a18acf1dfc7db39800b01ae5259ec8c6580ae4a4646bae4d
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
693KB
MD50387bac0c095a5d24fea2bcabdcd4748
SHA1720be1352caf647d2df4fa8545933474e84efc4f
SHA2564c3273a1f018603e24b1caf53284c226fc8ef5ef0ced232605fe0e22e8f3a27b
SHA512efa46fca5e86e2be32ef2f12db6f9b1af2c84b0e0e6df8e593fd50eaf4aa97e53b600622b763dd8e47797a3977e2123eb9f1aa6c23001c85513fb5a4f4cb9715
-
memory/2272-6-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/2468-19-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2740-0-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2740-5-0x0000000003320000-0x0000000003322000-memory.dmpFilesize
8KB
-
memory/2740-16-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2896-18-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB