Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 06:12
Behavioral task
behavioral1
Sample
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe
-
Size
693KB
-
MD5
0387bac0c095a5d24fea2bcabdcd4748
-
SHA1
720be1352caf647d2df4fa8545933474e84efc4f
-
SHA256
4c3273a1f018603e24b1caf53284c226fc8ef5ef0ced232605fe0e22e8f3a27b
-
SHA512
efa46fca5e86e2be32ef2f12db6f9b1af2c84b0e0e6df8e593fd50eaf4aa97e53b600622b763dd8e47797a3977e2123eb9f1aa6c23001c85513fb5a4f4cb9715
-
SSDEEP
12288:O8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixts:bUKoN0bUxgGa/pfBHDb+y1HgZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe -
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4484 attrib.exe 1808 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2632 msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
msdcsc.exeiexplore.exe0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2632 set thread context of 4668 2632 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 4668 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSecurityPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeLoadDriverPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemProfilePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemtimePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeBackupPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeRestorePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeShutdownPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeDebugPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeUndockPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeManageVolumePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeImpersonatePrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 33 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 34 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 35 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: 36 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2632 msdcsc.exe Token: SeSecurityPrivilege 2632 msdcsc.exe Token: SeTakeOwnershipPrivilege 2632 msdcsc.exe Token: SeLoadDriverPrivilege 2632 msdcsc.exe Token: SeSystemProfilePrivilege 2632 msdcsc.exe Token: SeSystemtimePrivilege 2632 msdcsc.exe Token: SeProfSingleProcessPrivilege 2632 msdcsc.exe Token: SeIncBasePriorityPrivilege 2632 msdcsc.exe Token: SeCreatePagefilePrivilege 2632 msdcsc.exe Token: SeBackupPrivilege 2632 msdcsc.exe Token: SeRestorePrivilege 2632 msdcsc.exe Token: SeShutdownPrivilege 2632 msdcsc.exe Token: SeDebugPrivilege 2632 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2632 msdcsc.exe Token: SeChangeNotifyPrivilege 2632 msdcsc.exe Token: SeRemoteShutdownPrivilege 2632 msdcsc.exe Token: SeUndockPrivilege 2632 msdcsc.exe Token: SeManageVolumePrivilege 2632 msdcsc.exe Token: SeImpersonatePrivilege 2632 msdcsc.exe Token: SeCreateGlobalPrivilege 2632 msdcsc.exe Token: 33 2632 msdcsc.exe Token: 34 2632 msdcsc.exe Token: 35 2632 msdcsc.exe Token: 36 2632 msdcsc.exe Token: SeIncreaseQuotaPrivilege 4668 iexplore.exe Token: SeSecurityPrivilege 4668 iexplore.exe Token: SeTakeOwnershipPrivilege 4668 iexplore.exe Token: SeLoadDriverPrivilege 4668 iexplore.exe Token: SeSystemProfilePrivilege 4668 iexplore.exe Token: SeSystemtimePrivilege 4668 iexplore.exe Token: SeProfSingleProcessPrivilege 4668 iexplore.exe Token: SeIncBasePriorityPrivilege 4668 iexplore.exe Token: SeCreatePagefilePrivilege 4668 iexplore.exe Token: SeBackupPrivilege 4668 iexplore.exe Token: SeRestorePrivilege 4668 iexplore.exe Token: SeShutdownPrivilege 4668 iexplore.exe Token: SeDebugPrivilege 4668 iexplore.exe Token: SeSystemEnvironmentPrivilege 4668 iexplore.exe Token: SeChangeNotifyPrivilege 4668 iexplore.exe Token: SeRemoteShutdownPrivilege 4668 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 4668 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.execmd.execmd.execmd.exemsdcsc.exedescription pid process target process PID 208 wrote to memory of 228 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 228 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 228 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 212 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 212 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 212 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 228 wrote to memory of 1808 228 cmd.exe attrib.exe PID 228 wrote to memory of 1808 228 cmd.exe attrib.exe PID 228 wrote to memory of 1808 228 cmd.exe attrib.exe PID 212 wrote to memory of 4484 212 cmd.exe attrib.exe PID 212 wrote to memory of 4484 212 cmd.exe attrib.exe PID 212 wrote to memory of 4484 212 cmd.exe attrib.exe PID 208 wrote to memory of 2976 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 2976 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 208 wrote to memory of 2976 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe cmd.exe PID 2976 wrote to memory of 5096 2976 cmd.exe PING.EXE PID 2976 wrote to memory of 5096 2976 cmd.exe PING.EXE PID 2976 wrote to memory of 5096 2976 cmd.exe PING.EXE PID 208 wrote to memory of 2632 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 208 wrote to memory of 2632 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 208 wrote to memory of 2632 208 0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe msdcsc.exe PID 2632 wrote to memory of 4668 2632 msdcsc.exe iexplore.exe PID 2632 wrote to memory of 4668 2632 msdcsc.exe iexplore.exe PID 2632 wrote to memory of 4668 2632 msdcsc.exe iexplore.exe PID 2632 wrote to memory of 4668 2632 msdcsc.exe iexplore.exe PID 2632 wrote to memory of 4668 2632 msdcsc.exe iexplore.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4484 attrib.exe 1808 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\0387bac0c095a5d24fea2bcabdcd4748_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 43⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
693KB
MD50387bac0c095a5d24fea2bcabdcd4748
SHA1720be1352caf647d2df4fa8545933474e84efc4f
SHA2564c3273a1f018603e24b1caf53284c226fc8ef5ef0ced232605fe0e22e8f3a27b
SHA512efa46fca5e86e2be32ef2f12db6f9b1af2c84b0e0e6df8e593fd50eaf4aa97e53b600622b763dd8e47797a3977e2123eb9f1aa6c23001c85513fb5a4f4cb9715
-
memory/208-0-0x0000000002270000-0x0000000002271000-memory.dmpFilesize
4KB
-
memory/208-63-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2632-65-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/4668-64-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB