Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 18:50
Behavioral task
behavioral1
Sample
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe
-
Size
848KB
-
MD5
08cf2a748bbae2d923864859b7399b72
-
SHA1
6dbaa83040a728d12a817c74708016f707f7a506
-
SHA256
fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170
-
SHA512
6a358f1ff7d3a0263e52a4d5fcff7cb95141a93dbbaf509e9d9d85004ed291fbd4156a18b017d819cd9210c05c3f5ab657d92c6496610220298d11038b4e0e38
-
SSDEEP
24576:d3nbWmJVJFwSddIXvfhqbiaxvRxq95HD0QZh9u:pamdZdcBYy0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 3528 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dastan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 3528 set thread context of 4392 3528 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeSecurityPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeSystemtimePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeBackupPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeRestorePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeShutdownPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeDebugPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeUndockPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeManageVolumePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeImpersonatePrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: 33 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: 34 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: 35 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: 36 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3528 msdcsc.exe Token: SeSecurityPrivilege 3528 msdcsc.exe Token: SeTakeOwnershipPrivilege 3528 msdcsc.exe Token: SeLoadDriverPrivilege 3528 msdcsc.exe Token: SeSystemProfilePrivilege 3528 msdcsc.exe Token: SeSystemtimePrivilege 3528 msdcsc.exe Token: SeProfSingleProcessPrivilege 3528 msdcsc.exe Token: SeIncBasePriorityPrivilege 3528 msdcsc.exe Token: SeCreatePagefilePrivilege 3528 msdcsc.exe Token: SeBackupPrivilege 3528 msdcsc.exe Token: SeRestorePrivilege 3528 msdcsc.exe Token: SeShutdownPrivilege 3528 msdcsc.exe Token: SeDebugPrivilege 3528 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3528 msdcsc.exe Token: SeChangeNotifyPrivilege 3528 msdcsc.exe Token: SeRemoteShutdownPrivilege 3528 msdcsc.exe Token: SeUndockPrivilege 3528 msdcsc.exe Token: SeManageVolumePrivilege 3528 msdcsc.exe Token: SeImpersonatePrivilege 3528 msdcsc.exe Token: SeCreateGlobalPrivilege 3528 msdcsc.exe Token: 33 3528 msdcsc.exe Token: 34 3528 msdcsc.exe Token: 35 3528 msdcsc.exe Token: 36 3528 msdcsc.exe Token: SeIncreaseQuotaPrivilege 4392 iexplore.exe Token: SeSecurityPrivilege 4392 iexplore.exe Token: SeTakeOwnershipPrivilege 4392 iexplore.exe Token: SeLoadDriverPrivilege 4392 iexplore.exe Token: SeSystemProfilePrivilege 4392 iexplore.exe Token: SeSystemtimePrivilege 4392 iexplore.exe Token: SeProfSingleProcessPrivilege 4392 iexplore.exe Token: SeIncBasePriorityPrivilege 4392 iexplore.exe Token: SeCreatePagefilePrivilege 4392 iexplore.exe Token: SeBackupPrivilege 4392 iexplore.exe Token: SeRestorePrivilege 4392 iexplore.exe Token: SeShutdownPrivilege 4392 iexplore.exe Token: SeDebugPrivilege 4392 iexplore.exe Token: SeSystemEnvironmentPrivilege 4392 iexplore.exe Token: SeChangeNotifyPrivilege 4392 iexplore.exe Token: SeRemoteShutdownPrivilege 4392 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 4392 iexplore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2860 wrote to memory of 3528 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe msdcsc.exe PID 2860 wrote to memory of 3528 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe msdcsc.exe PID 2860 wrote to memory of 3528 2860 08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe msdcsc.exe PID 3528 wrote to memory of 4392 3528 msdcsc.exe iexplore.exe PID 3528 wrote to memory of 4392 3528 msdcsc.exe iexplore.exe PID 3528 wrote to memory of 4392 3528 msdcsc.exe iexplore.exe PID 3528 wrote to memory of 4392 3528 msdcsc.exe iexplore.exe PID 3528 wrote to memory of 4392 3528 msdcsc.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exeFilesize
848KB
MD508cf2a748bbae2d923864859b7399b72
SHA16dbaa83040a728d12a817c74708016f707f7a506
SHA256fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170
SHA5126a358f1ff7d3a0263e52a4d5fcff7cb95141a93dbbaf509e9d9d85004ed291fbd4156a18b017d819cd9210c05c3f5ab657d92c6496610220298d11038b4e0e38
-
memory/2860-0-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/2860-63-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/3528-64-0x0000000002140000-0x0000000002141000-memory.dmpFilesize
4KB
-
memory/3528-66-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4392-65-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB