Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:46
Behavioral task
behavioral1
Sample
09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe
-
Size
126KB
-
MD5
09ad52ea39f86a47bd8d2e260c5955e0
-
SHA1
e4ef158f4463a1825f6978654b7ac43d3821c78e
-
SHA256
dd949d0a2bc937d1f93372b360da4ed7226bcfa9b20cfc710b4488f541a7179a
-
SHA512
1964609d01db1b4d0a038e1ee9c71b57a3f50c5330a39a841df706568baf1d31644eed1f88a4a32d6646997277460d2bf412a4db0a0b8fdd49fba079a01b179b
-
SSDEEP
3072:nBq1MIAxVR4YwsvquRGT29deW/tqxJ8+YuUZEW2K:nBsMIAPRtlqusqUxJVUZEW
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firewall Installer\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Installer\\cfmmon.exe" 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 cfmmon.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2756-0-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/files/0x003500000001567f-9.dat upx behavioral1/memory/2184-16-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2184-15-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall Installer\\cfmmon.exe" 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2184 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2184 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2184 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe 28 PID 2756 wrote to memory of 2184 2756 09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09ad52ea39f86a47bd8d2e260c5955e0_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\Firewall Installer\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall Installer\cfmmon.exe" in2⤵
- Executes dropped EXE
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5e364a7e4ed6cc64b9e3ce9f7c3edc29c
SHA1d8f19f48169e5bb3a2b4dbe660c4c429e4f71a20
SHA2560ef782ad6206f16ca8f8e4985335d099b59839cc55003c58734858a17c6741b9
SHA5127c0efbbc1d2dc03792afc60dbd76d15eabaac8b72c0e2d24c808a33dcdfa7e94a25b0c62540f94aa297414d58c6702dc905359c4e74a1296a72f36b383828c81