Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 12:24
Behavioral task
behavioral1
Sample
1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe
-
Size
281KB
-
MD5
1f515e387041e92f55fda67c641e404c
-
SHA1
e5e3f0b8341fe70fdaa2261c05bb038fd2a12ece
-
SHA256
1813a3cbd2ce370e1cfb072b0e48c198840e3bff70d916dd1094c0a0ce29a897
-
SHA512
154c7958923169a2bbfd6059e1b6c037a65609f201947fe4f05e13ddb787dbd8a3ee6edf2d07a5c18c4fc206f911e8fa3f0568a1c0769cbcb50e2c80f8631bdd
-
SSDEEP
6144:j1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4Qov:jkHcpSHY7VSrfT2/czO3HKv
Malware Config
Extracted
latentbot
kckconexant.zapto.org
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" explorer.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
resource yara_rule behavioral2/memory/4584-0-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-6-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-7-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-8-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-10-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-14-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-15-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/4584-12-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-9-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-16-0x0000000013140000-0x000000001320F000-memory.dmp upx behavioral2/memory/2352-18-0x0000000013140000-0x000000001320F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4584 set thread context of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeSecurityPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeSystemtimePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeBackupPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeRestorePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeShutdownPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeDebugPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeUndockPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeManageVolumePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeImpersonatePrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: 33 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: 34 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: 35 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: 36 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2352 explorer.exe Token: SeSecurityPrivilege 2352 explorer.exe Token: SeTakeOwnershipPrivilege 2352 explorer.exe Token: SeLoadDriverPrivilege 2352 explorer.exe Token: SeSystemProfilePrivilege 2352 explorer.exe Token: SeSystemtimePrivilege 2352 explorer.exe Token: SeProfSingleProcessPrivilege 2352 explorer.exe Token: SeIncBasePriorityPrivilege 2352 explorer.exe Token: SeCreatePagefilePrivilege 2352 explorer.exe Token: SeBackupPrivilege 2352 explorer.exe Token: SeRestorePrivilege 2352 explorer.exe Token: SeShutdownPrivilege 2352 explorer.exe Token: SeDebugPrivilege 2352 explorer.exe Token: SeSystemEnvironmentPrivilege 2352 explorer.exe Token: SeChangeNotifyPrivilege 2352 explorer.exe Token: SeRemoteShutdownPrivilege 2352 explorer.exe Token: SeUndockPrivilege 2352 explorer.exe Token: SeManageVolumePrivilege 2352 explorer.exe Token: SeImpersonatePrivilege 2352 explorer.exe Token: SeCreateGlobalPrivilege 2352 explorer.exe Token: 33 2352 explorer.exe Token: 34 2352 explorer.exe Token: 35 2352 explorer.exe Token: 36 2352 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 explorer.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2944 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 81 PID 4584 wrote to memory of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 PID 4584 wrote to memory of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 PID 4584 wrote to memory of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 PID 4584 wrote to memory of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 PID 4584 wrote to memory of 2352 4584 1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe 82 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83 PID 2352 wrote to memory of 116 2352 explorer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f515e387041e92f55fda67c641e404c_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Adds Run key to start application
PID:2944
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe3⤵PID:116
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2