Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe
-
Size
393KB
-
MD5
1834fe2fca9c479032ebbde186589bf7
-
SHA1
7dcab5bb0eb0cace56e1387e8fc3b1631f35d943
-
SHA256
20193069c7b313d2a61b75b2efc48492f47a98b037e05dbfb699e0ad56c732c0
-
SHA512
e5e7c796e46db856e1fbd808d2064ca29c6e4bb960d80aec28723d8810a7860719018ba3484583671ac5483a23a9afd4a7494d60c4c167f00293fca58ecf7d5e
-
SSDEEP
6144:4g0Vb/ZPiiFvbPidy5tgsLzpBNWP1ZCOLkErCaehJou589vHo4e96Vsq:KbhPii5iyxLzNsZxLkHhJpq9vdeYN
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ update.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\svc.exe = "C:\\WINDOWS\\msagent\\agtintl\\svc.exe:*:Enabled:svc.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\Outlooks.exe = "C:\\WINDOWS\\Outlooks.exe:*:Enabled:Outlooks.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\update.exe = "C:\\WINDOWS\\msagent\\agtintl\\update.exe:*:Enabled:update.exe" update.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\update.exe = "C:\\WINDOWS\\msagent\\agtintl\\update.exe:*:Enabled:update.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe:*:Enabled:svchosts.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\pcn.exe = "C:\\WINDOWS\\pcn.exe:*:Enabled:pcn.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\svc.exe = "C:\\WINDOWS\\msagent\\agtintl\\svc.exe:*:Enabled:svc.exe" update.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\msagent\agtintl\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe:*:Enabled:svchosts.exe" update.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\pcn.exe = "C:\\WINDOWS\\pcn.exe:*:Enabled:pcn.exe" update.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ update.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List update.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\Outlooks.exe = "C:\\WINDOWS\\Outlooks.exe:*:Enabled:Outlooks.exe" update.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2060 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 update.exe -
Loads dropped DLL 4 IoCs
pid Process 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 2784 update.exe 2784 update.exe 2784 update.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pcn.exe = "C:\\WINDOWS\\pcn.exe" 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts.exe = "C:\\WINDOWS\\msagent\\agtintl\\svchosts.exe" update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pcn.exe = "C:\\WINDOWS\\pcn.exe" update.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\msagent\agtintl\update.exe 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe File opened for modification C:\WINDOWS\msagent\agtintl\update.exe 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe File created C:\WINDOWS\ice.bat 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2644 sc.exe 2708 sc.exe 2720 sc.exe 2736 sc.exe 2888 sc.exe 2656 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2588 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 29 PID 1616 wrote to memory of 2588 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 29 PID 1616 wrote to memory of 2588 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 29 PID 1616 wrote to memory of 2588 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 29 PID 2588 wrote to memory of 2060 2588 cmd.exe 31 PID 2588 wrote to memory of 2060 2588 cmd.exe 31 PID 2588 wrote to memory of 2060 2588 cmd.exe 31 PID 2588 wrote to memory of 2060 2588 cmd.exe 31 PID 2588 wrote to memory of 2644 2588 cmd.exe 32 PID 2588 wrote to memory of 2644 2588 cmd.exe 32 PID 2588 wrote to memory of 2644 2588 cmd.exe 32 PID 2588 wrote to memory of 2644 2588 cmd.exe 32 PID 2588 wrote to memory of 2708 2588 cmd.exe 33 PID 2588 wrote to memory of 2708 2588 cmd.exe 33 PID 2588 wrote to memory of 2708 2588 cmd.exe 33 PID 2588 wrote to memory of 2708 2588 cmd.exe 33 PID 2588 wrote to memory of 2720 2588 cmd.exe 34 PID 2588 wrote to memory of 2720 2588 cmd.exe 34 PID 2588 wrote to memory of 2720 2588 cmd.exe 34 PID 2588 wrote to memory of 2720 2588 cmd.exe 34 PID 2588 wrote to memory of 2736 2588 cmd.exe 35 PID 2588 wrote to memory of 2736 2588 cmd.exe 35 PID 2588 wrote to memory of 2736 2588 cmd.exe 35 PID 2588 wrote to memory of 2736 2588 cmd.exe 35 PID 2588 wrote to memory of 2888 2588 cmd.exe 36 PID 2588 wrote to memory of 2888 2588 cmd.exe 36 PID 2588 wrote to memory of 2888 2588 cmd.exe 36 PID 2588 wrote to memory of 2888 2588 cmd.exe 36 PID 2588 wrote to memory of 2656 2588 cmd.exe 37 PID 2588 wrote to memory of 2656 2588 cmd.exe 37 PID 2588 wrote to memory of 2656 2588 cmd.exe 37 PID 2588 wrote to memory of 2656 2588 cmd.exe 37 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38 PID 1616 wrote to memory of 2784 1616 1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1834fe2fca9c479032ebbde186589bf7_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\ice.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set notifications Disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2060
-
-
C:\Windows\SysWOW64\sc.exesc stop SharedAccess3⤵
- Launches sc.exe
PID:2644
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2736
-
-
C:\Windows\SysWOW64\sc.exesc stop wscsvc3⤵
- Launches sc.exe
PID:2888
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled3⤵
- Launches sc.exe
PID:2656
-
-
-
C:\WINDOWS\msagent\agtintl\update.exeC:\WINDOWS\msagent\agtintl\update.exe2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD51604ad01e735f096a9494f3d1590865e
SHA18894a9efeb44f1c1af4bc09c7d13b19718edfc16
SHA256d40c23e8e65973f2c387e268a0ac7dd3a4358f724cbe3aa51e1fb05c8a837dcf
SHA51258cfb7cb142d0507990f7e60d2cb83eb0395466feba2985569189ea1b62063cd261647a002fcc89af423a12a6ea498735a0887f19498129d7e257e71e289819c
-
Filesize
393KB
MD51834fe2fca9c479032ebbde186589bf7
SHA17dcab5bb0eb0cace56e1387e8fc3b1631f35d943
SHA25620193069c7b313d2a61b75b2efc48492f47a98b037e05dbfb699e0ad56c732c0
SHA512e5e7c796e46db856e1fbd808d2064ca29c6e4bb960d80aec28723d8810a7860719018ba3484583671ac5483a23a9afd4a7494d60c4c167f00293fca58ecf7d5e