Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
0a17438f99aab65485edb0026685d14d
-
SHA1
9aaf0a58b141faa896eeca157ac552b53020d92a
-
SHA256
5c495dec2604e46e7da19c7a566ea49eb099b1b48903a5468604a80b950a1b7d
-
SHA512
2b32cf8486f51fe7fe09f5f53302bdd1b377f8897d331c32e190e9b655b6c5306e86c3c556081799fe60c45e295ab915d9a3ef67bde0a618646ac3229af25966
-
SSDEEP
12288:4d8G1EBDI/XVfZBFnj8hCws+1BldShOEI0GiBNNVqaNipha5agNPtIi/wrQgxu3D:ozwBVCA6nP3iSwZrd0z1bWhQXak3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Executes dropped EXE 3 IoCs
pid Process 2936 vbc.exe 2912 msdcsc.exe 2784 vbc.exe -
Loads dropped DLL 4 IoCs
pid Process 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 2936 vbc.exe 2936 vbc.exe 2912 msdcsc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2352 set thread context of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2912 set thread context of 2784 2912 msdcsc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2936 vbc.exe Token: SeSecurityPrivilege 2936 vbc.exe Token: SeTakeOwnershipPrivilege 2936 vbc.exe Token: SeLoadDriverPrivilege 2936 vbc.exe Token: SeSystemProfilePrivilege 2936 vbc.exe Token: SeSystemtimePrivilege 2936 vbc.exe Token: SeProfSingleProcessPrivilege 2936 vbc.exe Token: SeIncBasePriorityPrivilege 2936 vbc.exe Token: SeCreatePagefilePrivilege 2936 vbc.exe Token: SeBackupPrivilege 2936 vbc.exe Token: SeRestorePrivilege 2936 vbc.exe Token: SeShutdownPrivilege 2936 vbc.exe Token: SeDebugPrivilege 2936 vbc.exe Token: SeSystemEnvironmentPrivilege 2936 vbc.exe Token: SeChangeNotifyPrivilege 2936 vbc.exe Token: SeRemoteShutdownPrivilege 2936 vbc.exe Token: SeUndockPrivilege 2936 vbc.exe Token: SeManageVolumePrivilege 2936 vbc.exe Token: SeImpersonatePrivilege 2936 vbc.exe Token: SeCreateGlobalPrivilege 2936 vbc.exe Token: 33 2936 vbc.exe Token: 34 2936 vbc.exe Token: 35 2936 vbc.exe Token: SeIncreaseQuotaPrivilege 2784 vbc.exe Token: SeSecurityPrivilege 2784 vbc.exe Token: SeTakeOwnershipPrivilege 2784 vbc.exe Token: SeLoadDriverPrivilege 2784 vbc.exe Token: SeSystemProfilePrivilege 2784 vbc.exe Token: SeSystemtimePrivilege 2784 vbc.exe Token: SeProfSingleProcessPrivilege 2784 vbc.exe Token: SeIncBasePriorityPrivilege 2784 vbc.exe Token: SeCreatePagefilePrivilege 2784 vbc.exe Token: SeBackupPrivilege 2784 vbc.exe Token: SeRestorePrivilege 2784 vbc.exe Token: SeShutdownPrivilege 2784 vbc.exe Token: SeDebugPrivilege 2784 vbc.exe Token: SeSystemEnvironmentPrivilege 2784 vbc.exe Token: SeChangeNotifyPrivilege 2784 vbc.exe Token: SeRemoteShutdownPrivilege 2784 vbc.exe Token: SeUndockPrivilege 2784 vbc.exe Token: SeManageVolumePrivilege 2784 vbc.exe Token: SeImpersonatePrivilege 2784 vbc.exe Token: SeCreateGlobalPrivilege 2784 vbc.exe Token: 33 2784 vbc.exe Token: 34 2784 vbc.exe Token: 35 2784 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 vbc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2936 2352 0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2912 2936 vbc.exe 29 PID 2936 wrote to memory of 2912 2936 vbc.exe 29 PID 2936 wrote to memory of 2912 2936 vbc.exe 29 PID 2936 wrote to memory of 2912 2936 vbc.exe 29 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30 PID 2912 wrote to memory of 2784 2912 msdcsc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a17438f99aab65485edb0026685d14d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.2MB
MD50a17438f99aab65485edb0026685d14d
SHA19aaf0a58b141faa896eeca157ac552b53020d92a
SHA2565c495dec2604e46e7da19c7a566ea49eb099b1b48903a5468604a80b950a1b7d
SHA5122b32cf8486f51fe7fe09f5f53302bdd1b377f8897d331c32e190e9b655b6c5306e86c3c556081799fe60c45e295ab915d9a3ef67bde0a618646ac3229af25966