Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe
-
Size
606KB
-
MD5
21d7248e43c5b1ec2a1c4468120b85c1
-
SHA1
4254b53017172e3a9685706c225dbaaa3a3b3067
-
SHA256
be8ca47a21c739e9917a8cfac0a29202e46132b7b48095e8125be9e8b2c6c0f3
-
SHA512
f70becbd6f9f021358fe1d0a55706f51a8690de98a268671113d1c6e9a3e3a05a50c21958517ba563901f9611b3667965a2b42a2e9f1d32fc9f99a9b1c1a22b1
-
SSDEEP
12288:Zui5Rri4SicJcSROY3qlDUIxFPB1YunAa9m7A1Wj01:ZlmQcVRO+25t1v9g7j0
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\brkmail = "brkmail:*:Enabled:bkdoor" 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe:*:Enabled:ehnoispoooo" 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\System.exe 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\System.exe 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe -
Manipulates Digital Signatures 1 TTPs 4 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\TrustedPeople\CTLs 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\TrustedPeople\CRLs 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\TrustedPeople\Certificates 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\TrustedPeople 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Servicos = "C:\\Windows\\system32\\drivers\\System.exe" 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1192 2116 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe 80 PID 2116 wrote to memory of 1192 2116 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe 80 PID 2116 wrote to memory of 1192 2116 21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe 80 PID 1192 wrote to memory of 624 1192 net.exe 82 PID 1192 wrote to memory of 624 1192 net.exe 82 PID 1192 wrote to memory of 624 1192 net.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21d7248e43c5b1ec2a1c4468120b85c1_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:624
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1