Analysis
-
max time kernel
131s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
085a4a5430ccb482aaf5e1f428b2e035
-
SHA1
a1a22b49b830728849e84e4c2bb686f73eb252e4
-
SHA256
e4c9e8116827030fee7a80a2d2fbbadb2f0b0fc353dbe8833e57f7852ea86810
-
SHA512
71cd748b221f990e28c7978dd9213ebb711c346fb7bceaf8d01acf115c55afeec3450fd0dbf0b64dd8ab7232a7d92792acab158e681d51049f589b8ab820c1bf
-
SSDEEP
24576:/CSakkVYTNLqPY3Oz8zmpbZipBw8QVJBTyjCtAscY7EAqGvgbidbGFn15jnpCXmO:1k03o3lV3/tAs97EAqGTdban15jnAXd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\MSDCSC\\msdcsc.exe" service.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1960 attrib.exe 1576 attrib.exe -
Executes dropped EXE 8 IoCs
pid Process 2764 service.exe 2700 service.exe 2844 service.exe 1620 SERVICES.EXE 1824 WINDOWSLOGIN.EXE 1376 msdcsc.exe 2016 msdcsc.exe 2116 msdcsc.exe -
Loads dropped DLL 12 IoCs
pid Process 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2764 service.exe 2844 service.exe 2844 service.exe 2844 service.exe 2844 service.exe 2844 service.exe 2844 service.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\MSDCSC\\msdcsc.exe" service.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\service.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2764 set thread context of 2700 2764 service.exe 32 PID 2700 set thread context of 2844 2700 service.exe 33 PID 1376 set thread context of 2016 1376 msdcsc.exe 45 PID 2016 set thread context of 2116 2016 msdcsc.exe 48 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2116 msdcsc.exe 2956 dw20.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2844 service.exe Token: SeSecurityPrivilege 2844 service.exe Token: SeTakeOwnershipPrivilege 2844 service.exe Token: SeLoadDriverPrivilege 2844 service.exe Token: SeSystemProfilePrivilege 2844 service.exe Token: SeSystemtimePrivilege 2844 service.exe Token: SeProfSingleProcessPrivilege 2844 service.exe Token: SeIncBasePriorityPrivilege 2844 service.exe Token: SeCreatePagefilePrivilege 2844 service.exe Token: SeBackupPrivilege 2844 service.exe Token: SeRestorePrivilege 2844 service.exe Token: SeShutdownPrivilege 2844 service.exe Token: SeDebugPrivilege 2844 service.exe Token: SeSystemEnvironmentPrivilege 2844 service.exe Token: SeChangeNotifyPrivilege 2844 service.exe Token: SeRemoteShutdownPrivilege 2844 service.exe Token: SeUndockPrivilege 2844 service.exe Token: SeManageVolumePrivilege 2844 service.exe Token: SeImpersonatePrivilege 2844 service.exe Token: SeCreateGlobalPrivilege 2844 service.exe Token: 33 2844 service.exe Token: 34 2844 service.exe Token: 35 2844 service.exe Token: SeIncreaseQuotaPrivilege 2116 msdcsc.exe Token: SeSecurityPrivilege 2116 msdcsc.exe Token: SeTakeOwnershipPrivilege 2116 msdcsc.exe Token: SeLoadDriverPrivilege 2116 msdcsc.exe Token: SeSystemProfilePrivilege 2116 msdcsc.exe Token: SeSystemtimePrivilege 2116 msdcsc.exe Token: SeProfSingleProcessPrivilege 2116 msdcsc.exe Token: SeIncBasePriorityPrivilege 2116 msdcsc.exe Token: SeCreatePagefilePrivilege 2116 msdcsc.exe Token: SeBackupPrivilege 2116 msdcsc.exe Token: SeRestorePrivilege 2116 msdcsc.exe Token: SeShutdownPrivilege 2116 msdcsc.exe Token: SeDebugPrivilege 2116 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2116 msdcsc.exe Token: SeChangeNotifyPrivilege 2116 msdcsc.exe Token: SeRemoteShutdownPrivilege 2116 msdcsc.exe Token: SeUndockPrivilege 2116 msdcsc.exe Token: SeManageVolumePrivilege 2116 msdcsc.exe Token: SeImpersonatePrivilege 2116 msdcsc.exe Token: SeCreateGlobalPrivilege 2116 msdcsc.exe Token: 33 2116 msdcsc.exe Token: 34 2116 msdcsc.exe Token: 35 2116 msdcsc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 2764 service.exe 2700 service.exe 1376 msdcsc.exe 2016 msdcsc.exe 2116 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2480 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2480 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2480 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 28 PID 2164 wrote to memory of 2480 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 28 PID 2480 wrote to memory of 2736 2480 cmd.exe 30 PID 2480 wrote to memory of 2736 2480 cmd.exe 30 PID 2480 wrote to memory of 2736 2480 cmd.exe 30 PID 2480 wrote to memory of 2736 2480 cmd.exe 30 PID 2164 wrote to memory of 2764 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2764 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2764 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2764 2164 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2764 wrote to memory of 2700 2764 service.exe 32 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2700 wrote to memory of 2844 2700 service.exe 33 PID 2844 wrote to memory of 2888 2844 service.exe 34 PID 2844 wrote to memory of 2888 2844 service.exe 34 PID 2844 wrote to memory of 2888 2844 service.exe 34 PID 2844 wrote to memory of 2888 2844 service.exe 34 PID 2844 wrote to memory of 3040 2844 service.exe 36 PID 2844 wrote to memory of 3040 2844 service.exe 36 PID 2844 wrote to memory of 3040 2844 service.exe 36 PID 2844 wrote to memory of 3040 2844 service.exe 36 PID 2844 wrote to memory of 1620 2844 service.exe 38 PID 2844 wrote to memory of 1620 2844 service.exe 38 PID 2844 wrote to memory of 1620 2844 service.exe 38 PID 2844 wrote to memory of 1620 2844 service.exe 38 PID 2844 wrote to memory of 1824 2844 service.exe 40 PID 2844 wrote to memory of 1824 2844 service.exe 40 PID 2844 wrote to memory of 1824 2844 service.exe 40 PID 2844 wrote to memory of 1824 2844 service.exe 40 PID 2888 wrote to memory of 1960 2888 cmd.exe 41 PID 2888 wrote to memory of 1960 2888 cmd.exe 41 PID 2888 wrote to memory of 1960 2888 cmd.exe 41 PID 2888 wrote to memory of 1960 2888 cmd.exe 41 PID 3040 wrote to memory of 1576 3040 cmd.exe 43 PID 3040 wrote to memory of 1576 3040 cmd.exe 43 PID 3040 wrote to memory of 1576 3040 cmd.exe 43 PID 3040 wrote to memory of 1576 3040 cmd.exe 43 PID 2844 wrote to memory of 1376 2844 service.exe 44 PID 2844 wrote to memory of 1376 2844 service.exe 44 PID 2844 wrote to memory of 1376 2844 service.exe 44 PID 2844 wrote to memory of 1376 2844 service.exe 44 PID 1376 wrote to memory of 2016 1376 msdcsc.exe 45 PID 1376 wrote to memory of 2016 1376 msdcsc.exe 45 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1960 attrib.exe 1576 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259399632.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f3⤵
- Adds Run key to start application
PID:2736
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeC:\Users\Admin\AppData\Roaming\Microsoft\service.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVICES.EXE"C:\Users\Admin\AppData\Local\Temp\SERVICES.EXE"5⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8206⤵PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\WINDOWSLOGIN.EXE"C:\Users\Admin\AppData\Local\Temp\WINDOWSLOGIN.EXE"5⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8286⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2956
-
-
-
C:\MSDCSC\msdcsc.exe"C:\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\MSDCSC\msdcsc.exeC:\MSDCSC\msdcsc.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\MSDCSC\msdcsc.exe
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2116
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD57eee65b102f30fd1ead48a8cd3b99827
SHA12f74a754019f280c6186c11531d460006814952e
SHA2565748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f
SHA512a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85
-
Filesize
69B
MD5983852d880a609ff25817b47f0c436f8
SHA16603aa3e0cb33794344aaadfde3b1f561e1b8f49
SHA256f1c5798294612fde0df50d42e530b2013aea877f49cce2aef78df42ce1e53203
SHA512b5b2681c27258dd428f7c26bcb277ab2069fa3f82f1945d9879b50c3734ef738be5de5bdb37699fe9522bb138b554f49821e05529011c7c3166cb3cab6aa0b58
-
Filesize
57B
MD5960ff9f0fdcc7fe6180f159185b228dd
SHA1562e42c0f4c5c1b30b086cd1c110645391bb9cb2
SHA256527513b95baf56c82cc823317b90be26f3d3f3ece8046152cdbb0e8092e7d44d
SHA512a3a4d87968efc28b2d736ebd2d9b818c2e7d58d2588124e05f71d82a1a9b0dd5ae8c145b5b8098089d480da93ad535a427d648f6230f6e2bacfda9056110dc62
-
Filesize
6KB
MD50b3db22d987384297d6d3e37bbb42525
SHA1505682a108f0cf55caaeca6c781f4d49cc2d8edf
SHA256883b8f25dec2a5f565c45363f81402969ce5b5e4d03fc565ccc2fd162916aa00
SHA512b03cae2a2fcd46b0fde982214a11db50f6443d85efcf67b51ef60bb5a9fa3b0ad4b6b274c6175c634c7d343ee9253877d52712d1fee0e5b8843e1d3301273ae8
-
Filesize
6KB
MD5d52e36ac4ab591f5cac32b433d2134fc
SHA1868df7e02042482a37cae9c1b1b7cc25e63b7ab2
SHA256968266055dfa20300ee91a14f3344864b07cd1505054186f91946cccfcb96207
SHA512c77c10dbcf58a86a384b413bb064df1af535af48744fe744d03cdfee16df1efa8275216b9cbe083294dac4cfd9e3445e7bb5e1f9051f462be484ae95ab622541
-
Filesize
1.7MB
MD5d0a34581ffb8d6d99ef29b6e46e06ab8
SHA15a169f12cf42262ffd62cc1bab213654d7a4dac6
SHA256e59240de73344a6cb74551be43702ca23b8c0156ba8cbcb842118509360657f1
SHA512515068e21b1fbb018651e0e53394a5171d92d65eb3de4105efe067cb05f173d6e68d5b908c6684bcf5c53b1891a5752b4b4176044f63e805d7d0896e6c3fd941