Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe
-
Size
810KB
-
MD5
0eb8062d3c7a14a325a2e5d8c325f0ba
-
SHA1
18988994bee5da320a137e4e7bb4ec3ef67f4fd6
-
SHA256
572e7490570d77c3f37b52fd65dfe7eaa4d46cd716581640b567662a1fbd4831
-
SHA512
22012f6166f694e0407a87f741c4064a7f2acadf22104a63f47686977327f2c7b59d3e16db5b55b18042e2a9c5c7ffc906306c4253233504a98b450c7f8e7810
-
SSDEEP
12288:pC6Ut6RJ9mbupafIKsFzq3+lBxnX2Hf4CmmeKc1ett18n4SytyUkmgKGMsd28AeG:9MYMC2IBdUtCgiTyQdbHz3+SH4uG
Malware Config
Extracted
latentbot
1easydung69.zapto.org
2easydung69.zapto.org
3easydung69.zapto.org
4easydung69.zapto.org
5easydung69.zapto.org
6easydung69.zapto.org
7easydung69.zapto.org
8easydung69.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\taskmgr.exe = "C:\\Users\\Admin\\AppData\\Roaming\\taskmgr.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\cvs.exe = "C:\\Users\\Admin\\AppData\\Roaming\\cvs.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes1181.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes1181.exe -
Executes dropped EXE 2 IoCs
pid Process 1904 taskmgr.exe 584 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes1181.exe -
Loads dropped DLL 4 IoCs
pid Process 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1904-18-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-14-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-12-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-22-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-21-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-24-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-23-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-54-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-55-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-56-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-57-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-60-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-61-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-63-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-64-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1904-69-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2080 set thread context of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2604 reg.exe 2940 reg.exe 2500 reg.exe 2556 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1904 taskmgr.exe Token: SeCreateTokenPrivilege 1904 taskmgr.exe Token: SeAssignPrimaryTokenPrivilege 1904 taskmgr.exe Token: SeLockMemoryPrivilege 1904 taskmgr.exe Token: SeIncreaseQuotaPrivilege 1904 taskmgr.exe Token: SeMachineAccountPrivilege 1904 taskmgr.exe Token: SeTcbPrivilege 1904 taskmgr.exe Token: SeSecurityPrivilege 1904 taskmgr.exe Token: SeTakeOwnershipPrivilege 1904 taskmgr.exe Token: SeLoadDriverPrivilege 1904 taskmgr.exe Token: SeSystemProfilePrivilege 1904 taskmgr.exe Token: SeSystemtimePrivilege 1904 taskmgr.exe Token: SeProfSingleProcessPrivilege 1904 taskmgr.exe Token: SeIncBasePriorityPrivilege 1904 taskmgr.exe Token: SeCreatePagefilePrivilege 1904 taskmgr.exe Token: SeCreatePermanentPrivilege 1904 taskmgr.exe Token: SeBackupPrivilege 1904 taskmgr.exe Token: SeRestorePrivilege 1904 taskmgr.exe Token: SeShutdownPrivilege 1904 taskmgr.exe Token: SeDebugPrivilege 1904 taskmgr.exe Token: SeAuditPrivilege 1904 taskmgr.exe Token: SeSystemEnvironmentPrivilege 1904 taskmgr.exe Token: SeChangeNotifyPrivilege 1904 taskmgr.exe Token: SeRemoteShutdownPrivilege 1904 taskmgr.exe Token: SeUndockPrivilege 1904 taskmgr.exe Token: SeSyncAgentPrivilege 1904 taskmgr.exe Token: SeEnableDelegationPrivilege 1904 taskmgr.exe Token: SeManageVolumePrivilege 1904 taskmgr.exe Token: SeImpersonatePrivilege 1904 taskmgr.exe Token: SeCreateGlobalPrivilege 1904 taskmgr.exe Token: 31 1904 taskmgr.exe Token: 32 1904 taskmgr.exe Token: 33 1904 taskmgr.exe Token: 34 1904 taskmgr.exe Token: 35 1904 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1904 taskmgr.exe 1904 taskmgr.exe 1904 taskmgr.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 1904 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 28 PID 2080 wrote to memory of 3032 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 29 PID 2080 wrote to memory of 3032 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 29 PID 2080 wrote to memory of 3032 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 29 PID 2080 wrote to memory of 3032 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 29 PID 1904 wrote to memory of 2724 1904 taskmgr.exe 30 PID 1904 wrote to memory of 2724 1904 taskmgr.exe 30 PID 1904 wrote to memory of 2724 1904 taskmgr.exe 30 PID 1904 wrote to memory of 2724 1904 taskmgr.exe 30 PID 1904 wrote to memory of 2520 1904 taskmgr.exe 32 PID 1904 wrote to memory of 2520 1904 taskmgr.exe 32 PID 1904 wrote to memory of 2520 1904 taskmgr.exe 32 PID 1904 wrote to memory of 2520 1904 taskmgr.exe 32 PID 1904 wrote to memory of 2508 1904 taskmgr.exe 34 PID 1904 wrote to memory of 2508 1904 taskmgr.exe 34 PID 1904 wrote to memory of 2508 1904 taskmgr.exe 34 PID 1904 wrote to memory of 2508 1904 taskmgr.exe 34 PID 1904 wrote to memory of 2620 1904 taskmgr.exe 36 PID 1904 wrote to memory of 2620 1904 taskmgr.exe 36 PID 1904 wrote to memory of 2620 1904 taskmgr.exe 36 PID 1904 wrote to memory of 2620 1904 taskmgr.exe 36 PID 2724 wrote to memory of 2500 2724 cmd.exe 39 PID 2724 wrote to memory of 2500 2724 cmd.exe 39 PID 2724 wrote to memory of 2500 2724 cmd.exe 39 PID 2724 wrote to memory of 2500 2724 cmd.exe 39 PID 2520 wrote to memory of 2556 2520 cmd.exe 40 PID 2520 wrote to memory of 2556 2520 cmd.exe 40 PID 2520 wrote to memory of 2556 2520 cmd.exe 40 PID 2520 wrote to memory of 2556 2520 cmd.exe 40 PID 2508 wrote to memory of 2604 2508 cmd.exe 41 PID 2508 wrote to memory of 2604 2508 cmd.exe 41 PID 2508 wrote to memory of 2604 2508 cmd.exe 41 PID 2508 wrote to memory of 2604 2508 cmd.exe 41 PID 2620 wrote to memory of 2940 2620 cmd.exe 42 PID 2620 wrote to memory of 2940 2620 cmd.exe 42 PID 2620 wrote to memory of 2940 2620 cmd.exe 42 PID 2620 wrote to memory of 2940 2620 cmd.exe 42 PID 3032 wrote to memory of 1720 3032 vbc.exe 43 PID 3032 wrote to memory of 1720 3032 vbc.exe 43 PID 3032 wrote to memory of 1720 3032 vbc.exe 43 PID 3032 wrote to memory of 1720 3032 vbc.exe 43 PID 2080 wrote to memory of 584 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 44 PID 2080 wrote to memory of 584 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 44 PID 2080 wrote to memory of 584 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 44 PID 2080 wrote to memory of 584 2080 0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cvs.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cvs.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cvs.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cvs.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2940
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\_wtu80bi.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6134.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6133.tmp"3⤵PID:1720
-
-
-
C:\Users\Admin\AppData\Roaming\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes1181.exe"C:\Users\Admin\AppData\Roaming\0eb8062d3c7a14a325a2e5d8c325f0ba_JaffaCakes1181.exe"2⤵
- Drops startup file
- Executes dropped EXE
PID:584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5026654ca29901eb6e755c0e61b33815d
SHA151c39dc01f2314587df14ba7ee55e0cc6e3e9842
SHA25602742a86055fb404fdb2f4856a753efb183f52b0ea1f30b2ab2e2b1fd02799d6
SHA512a68bf860cedb190bf054bb585413ed5de72c5e2ca66b6660c244ff5a68404b85043f3a01e214c4b2c3205e30c0d2acac5d2c7ddb5bd3f92dc3acf5194602b7b9
-
Filesize
381B
MD51049a2311cdb66f3af6111ce8096a7c5
SHA184c6cb31407639351fe96203eeea848765b77e09
SHA2563518c3c4d7186e037404595ecaab82f5eebafc00828fbe44a57a82166b0b3893
SHA5125e33ac030c1fc83c0f67fcbaf018ad2abb7422dd3e032492179263984de4e608923d49cef35bfcb7fd488092671a0c2159cb04962b73038900ebfb94f1c7f74a
-
Filesize
235B
MD56e056432c6099120d2f16abb18f135bf
SHA1aaf550136a713ebfa6b7d01b2041e745fd959f8e
SHA2569dde81ecc72dfeb713cef76663f168773ced51fcbccf9e6d3ce3b1870f910203
SHA5123fc64af7bde5e56b540c872741a2fb18c4b6cd9486bd96cb6df3bfe31b5a286511ed27f8468b84a7e015db073667167b55a2a869cf78645e4ff29a8dde091542
-
Filesize
804B
MD5808f1f55b7a943e385b4a5e7381aa983
SHA123531226db4edf6d508d1ee474b475158fd99d44
SHA256dda6580d45f9e572c9bb3b1faff4ec29d09fe191809d6388c1088b5bd3b94777
SHA512419da80b6d2ed147bb4382adcc8f17395a703b4fdd5e8f590cd020de1314f461688a3a1cf9c5ed80c5a1e8b2f31d1aba45177b1417bd16f416570c8ba9a5ddca
-
Filesize
810KB
MD50eb8062d3c7a14a325a2e5d8c325f0ba
SHA118988994bee5da320a137e4e7bb4ec3ef67f4fd6
SHA256572e7490570d77c3f37b52fd65dfe7eaa4d46cd716581640b567662a1fbd4831
SHA51222012f6166f694e0407a87f741c4064a7f2acadf22104a63f47686977327f2c7b59d3e16db5b55b18042e2a9c5c7ffc906306c4253233504a98b450c7f8e7810
-
Filesize
6KB
MD5e4be76ba5b7a407408b8685361f4c4e3
SHA189ad99748a3ce55a29960161f17f3e0b416fad45
SHA256d406d8877bb126524d6ceec0cb93c3b13a8ded3f2c15bf4012864fbe8a034185
SHA512e069af591df666813be0e8242e15dc1e518ca90eecc39404b55972f7bb81be04e73fc7ec2c9661678124cb6634296a981f601b468c710bcf0b3e10581c80cada
-
Filesize
12KB
MD5d4d99a39dbcf8d2a6a3fd7c52a29ad68
SHA1128301ca279d7cf9f0a5bd6b6105ff5d2f4e76f3
SHA25604f15f3cd3bcde2293f5619a1e3bcafbaffb4e6a6be61d095dda319f181dcfbd
SHA512314401336944460ec4bf9c2005d53f34fcdb871d345f62c10b28483a4b0663476b0d28757e857cd0eb6639eb36b10d2548343fde136f367b84ed13e0b2f9baf9