Analysis
-
max time kernel
125s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
-
Size
390KB
-
MD5
068dca5294b5060298631f2adf944735
-
SHA1
6266c1dd5d7008a9322a253c56e5b42850d7a664
-
SHA256
3e319d191903a91e1d8dcf84ae11139be9dc064550cd896378134607c40e836a
-
SHA512
93724ad5326747ee67ba9455c905e018697c8c4be32c9ba88cb5cd5f2a25535014cd5d45c5b311f71a84eeddb2965a74ce422262677cc23463ba01908560689f
-
SSDEEP
6144:TG0tZhwWYGKONpKPfMXsKuiHyAxM6LV+gQlXRsj3mQTxvV9DDZN9X/xymS:JTqONpKPfMXcm1hwlB63mCV9r3LS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" 068dca5294b5060298631f2adf944735_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
Microsoft.exeMicrosoft.exepid process 2540 Microsoft.exe 2560 Microsoft.exe -
Loads dropped DLL 3 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exepid process 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 2540 Microsoft.exe -
Processes:
resource yara_rule behavioral1/memory/2988-2-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-3-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-4-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-5-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-6-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-7-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-8-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2988-22-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-30-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-31-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-32-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-33-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-34-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-38-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-37-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-36-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-35-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-39-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-40-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-42-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-41-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-43-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-44-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-45-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-46-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-47-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-48-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-49-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-50-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-51-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-52-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-53-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2560-54-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" Microsoft.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process target process PID 2128 set thread context of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2540 set thread context of 2560 2540 Microsoft.exe Microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process Token: SeIncreaseQuotaPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSecurityPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemtimePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeBackupPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeRestorePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeShutdownPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeDebugPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeUndockPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeManageVolumePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeImpersonatePrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 33 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 34 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 35 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2560 Microsoft.exe Token: SeSecurityPrivilege 2560 Microsoft.exe Token: SeTakeOwnershipPrivilege 2560 Microsoft.exe Token: SeLoadDriverPrivilege 2560 Microsoft.exe Token: SeSystemProfilePrivilege 2560 Microsoft.exe Token: SeSystemtimePrivilege 2560 Microsoft.exe Token: SeProfSingleProcessPrivilege 2560 Microsoft.exe Token: SeIncBasePriorityPrivilege 2560 Microsoft.exe Token: SeCreatePagefilePrivilege 2560 Microsoft.exe Token: SeBackupPrivilege 2560 Microsoft.exe Token: SeRestorePrivilege 2560 Microsoft.exe Token: SeShutdownPrivilege 2560 Microsoft.exe Token: SeDebugPrivilege 2560 Microsoft.exe Token: SeSystemEnvironmentPrivilege 2560 Microsoft.exe Token: SeChangeNotifyPrivilege 2560 Microsoft.exe Token: SeRemoteShutdownPrivilege 2560 Microsoft.exe Token: SeUndockPrivilege 2560 Microsoft.exe Token: SeManageVolumePrivilege 2560 Microsoft.exe Token: SeImpersonatePrivilege 2560 Microsoft.exe Token: SeCreateGlobalPrivilege 2560 Microsoft.exe Token: 33 2560 Microsoft.exe Token: 34 2560 Microsoft.exe Token: 35 2560 Microsoft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exeMicrosoft.exepid process 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 2540 Microsoft.exe 2560 Microsoft.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exe068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process target process PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2128 wrote to memory of 2988 2128 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 2988 wrote to memory of 2540 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 2988 wrote to memory of 2540 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 2988 wrote to memory of 2540 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 2988 wrote to memory of 2540 2988 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe PID 2540 wrote to memory of 2560 2540 Microsoft.exe Microsoft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exeFilesize
390KB
MD5068dca5294b5060298631f2adf944735
SHA16266c1dd5d7008a9322a253c56e5b42850d7a664
SHA2563e319d191903a91e1d8dcf84ae11139be9dc064550cd896378134607c40e836a
SHA51293724ad5326747ee67ba9455c905e018697c8c4be32c9ba88cb5cd5f2a25535014cd5d45c5b311f71a84eeddb2965a74ce422262677cc23463ba01908560689f
-
memory/2560-45-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-47-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-54-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-35-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-53-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-52-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-51-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-39-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-30-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-31-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-32-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-33-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-34-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-40-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-37-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-36-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-50-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-49-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-38-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-42-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-41-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-43-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-44-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-48-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2560-46-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-4-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-2-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-22-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-6-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-3-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-8-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-7-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2988-5-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB