Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe
-
Size
78KB
-
MD5
1834f4a674f575c2f1fd5b8794b49f69
-
SHA1
ecb4122e1b48d88d8cdaf70bba1c4598741c4b3b
-
SHA256
d6770f616e4fac15397b905fa174deaf6a09803a28553c214fcdd4a9fc6303c7
-
SHA512
b8b69836b1bf4573232ce85092118474d312258f1daab651c36dfbe7dadb509aea279ddc3a76e75d480125e9b4eb0043d9341cdeb0fce11079d5c5da9857a25c
-
SSDEEP
1536:8Fa5WBIAXkzOtVFnwhzPxVnekJsCZAPBcQAiUBe:8s5taVFU3nlTmPBcQAiUBe
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications file1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\file1.exe = "C:\\file1.exe:*:Enabled:Msnsnger" file1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List file1.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile file1.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 228 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3200 file1.exe 412 Msnsnger.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Msnsnger = "Msnsnger.exe" file1.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Msnsnger.exe file1.exe File opened for modification C:\Windows\Msnsnger.exe file1.exe File opened for modification C:\Windows\lan Msnsnger.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe 3200 file1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3200 2264 1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe 80 PID 2264 wrote to memory of 3200 2264 1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe 80 PID 2264 wrote to memory of 3200 2264 1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe 80 PID 3200 wrote to memory of 228 3200 file1.exe 81 PID 3200 wrote to memory of 228 3200 file1.exe 81 PID 3200 wrote to memory of 228 3200 file1.exe 81 PID 3200 wrote to memory of 412 3200 file1.exe 82 PID 3200 wrote to memory of 412 3200 file1.exe 82 PID 3200 wrote to memory of 412 3200 file1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1834f4a674f575c2f1fd5b8794b49f69_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\file1.exeC:\file1.exe2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:228
-
-
C:\Windows\Msnsnger.exe"C:\Windows\Msnsnger.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5b031dfdfd97a07c38cd1a08e344eafd5
SHA18adc9143176bed9844d4089c6a2e5cc8d126112e
SHA2563ac8a0afb801ddd9e0b1bb3689bc24606ac09a7e000c3ba7cf35931904cb9f07
SHA5124f2b7ddb824beb457c732dc456dc79934e72a8e727df592620765c5f48cac6004d6eb289e96d13e7370af4199f7e6707a9605fc1bc6fd252605598e3724f3259