Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe
-
Size
242KB
-
MD5
2264289f009d42213b66cffcbf5a10e3
-
SHA1
514a24dd120158bcfb5f1e3ce9b5e239bd96c43d
-
SHA256
2305bde763611feb701816efdf831e878e28bd0091c06f3475b6706973343894
-
SHA512
2acacb25a27beb28b0b3ba0ef75f0e0d98076778d6d244586b75b09f0b12d3432f7bcd588a6bcf50652b6ca584d2c815304c83f1a5b485f24b9799b10a9081b5
-
SSDEEP
6144:21o94vxDn7zFwBqDH8bssHT2ZqjeqhGcHDNNNeXZ:8oOeBqzbscqjF8cHg
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\RunescapeHack.exe = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\111 = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEE2FBC3-DAB2-DE0F-DADA-C5FFAE35AF4F} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEE2FBC3-DAB2-DE0F-DADA-C5FFAE35AF4F}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{DEE2FBC3-DAB2-DE0F-DADA-C5FFAE35AF4F} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Active Setup\Installed Components\{DEE2FBC3-DAB2-DE0F-DADA-C5FFAE35AF4F}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2532 svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2532 svchost.exe 2724 svchost.exe 2976 audiodgi.exe 2780 wmpmetwk.exe -
Loads dropped DLL 7 IoCs
pid Process 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 2532 svchost.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe -
resource yara_rule behavioral1/memory/2724-28-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-33-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-30-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-36-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-37-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-40-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2724-54-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\111 = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\111 = "C:\\Users\\Admin\\AppData\\Roaming\\RunescapeHack.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2724 2532 svchost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2776 reg.exe 2052 reg.exe 1600 reg.exe 2332 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2976 audiodgi.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2976 audiodgi.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2976 audiodgi.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe 2976 audiodgi.exe 2976 audiodgi.exe 2780 wmpmetwk.exe 2532 svchost.exe 2976 audiodgi.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe Token: SeDebugPrivilege 2532 svchost.exe Token: SeDebugPrivilege 2976 audiodgi.exe Token: 1 2724 svchost.exe Token: SeCreateTokenPrivilege 2724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2724 svchost.exe Token: SeLockMemoryPrivilege 2724 svchost.exe Token: SeIncreaseQuotaPrivilege 2724 svchost.exe Token: SeMachineAccountPrivilege 2724 svchost.exe Token: SeTcbPrivilege 2724 svchost.exe Token: SeSecurityPrivilege 2724 svchost.exe Token: SeTakeOwnershipPrivilege 2724 svchost.exe Token: SeLoadDriverPrivilege 2724 svchost.exe Token: SeSystemProfilePrivilege 2724 svchost.exe Token: SeSystemtimePrivilege 2724 svchost.exe Token: SeProfSingleProcessPrivilege 2724 svchost.exe Token: SeIncBasePriorityPrivilege 2724 svchost.exe Token: SeCreatePagefilePrivilege 2724 svchost.exe Token: SeCreatePermanentPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeRestorePrivilege 2724 svchost.exe Token: SeShutdownPrivilege 2724 svchost.exe Token: SeDebugPrivilege 2724 svchost.exe Token: SeAuditPrivilege 2724 svchost.exe Token: SeSystemEnvironmentPrivilege 2724 svchost.exe Token: SeChangeNotifyPrivilege 2724 svchost.exe Token: SeRemoteShutdownPrivilege 2724 svchost.exe Token: SeUndockPrivilege 2724 svchost.exe Token: SeSyncAgentPrivilege 2724 svchost.exe Token: SeEnableDelegationPrivilege 2724 svchost.exe Token: SeManageVolumePrivilege 2724 svchost.exe Token: SeImpersonatePrivilege 2724 svchost.exe Token: SeCreateGlobalPrivilege 2724 svchost.exe Token: 31 2724 svchost.exe Token: 32 2724 svchost.exe Token: 33 2724 svchost.exe Token: 34 2724 svchost.exe Token: 35 2724 svchost.exe Token: SeDebugPrivilege 2724 svchost.exe Token: SeDebugPrivilege 2780 wmpmetwk.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2532 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2532 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2532 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 28 PID 2524 wrote to memory of 2532 2524 2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe 28 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2724 2532 svchost.exe 29 PID 2532 wrote to memory of 2976 2532 svchost.exe 30 PID 2532 wrote to memory of 2976 2532 svchost.exe 30 PID 2532 wrote to memory of 2976 2532 svchost.exe 30 PID 2532 wrote to memory of 2976 2532 svchost.exe 30 PID 2724 wrote to memory of 2452 2724 svchost.exe 31 PID 2724 wrote to memory of 2452 2724 svchost.exe 31 PID 2724 wrote to memory of 2452 2724 svchost.exe 31 PID 2724 wrote to memory of 2452 2724 svchost.exe 31 PID 2724 wrote to memory of 2504 2724 svchost.exe 33 PID 2724 wrote to memory of 2504 2724 svchost.exe 33 PID 2724 wrote to memory of 2504 2724 svchost.exe 33 PID 2724 wrote to memory of 2504 2724 svchost.exe 33 PID 2724 wrote to memory of 2560 2724 svchost.exe 34 PID 2724 wrote to memory of 2560 2724 svchost.exe 34 PID 2724 wrote to memory of 2560 2724 svchost.exe 34 PID 2724 wrote to memory of 2560 2724 svchost.exe 34 PID 2724 wrote to memory of 2896 2724 svchost.exe 36 PID 2724 wrote to memory of 2896 2724 svchost.exe 36 PID 2724 wrote to memory of 2896 2724 svchost.exe 36 PID 2724 wrote to memory of 2896 2724 svchost.exe 36 PID 2452 wrote to memory of 2052 2452 cmd.exe 39 PID 2452 wrote to memory of 2052 2452 cmd.exe 39 PID 2452 wrote to memory of 2052 2452 cmd.exe 39 PID 2452 wrote to memory of 2052 2452 cmd.exe 39 PID 2504 wrote to memory of 1600 2504 cmd.exe 40 PID 2504 wrote to memory of 1600 2504 cmd.exe 40 PID 2504 wrote to memory of 1600 2504 cmd.exe 40 PID 2504 wrote to memory of 1600 2504 cmd.exe 40 PID 2896 wrote to memory of 2332 2896 cmd.exe 41 PID 2896 wrote to memory of 2332 2896 cmd.exe 41 PID 2896 wrote to memory of 2332 2896 cmd.exe 41 PID 2896 wrote to memory of 2332 2896 cmd.exe 41 PID 2560 wrote to memory of 2776 2560 cmd.exe 42 PID 2560 wrote to memory of 2776 2560 cmd.exe 42 PID 2560 wrote to memory of 2776 2560 cmd.exe 42 PID 2560 wrote to memory of 2776 2560 cmd.exe 42 PID 2976 wrote to memory of 2780 2976 audiodgi.exe 43 PID 2976 wrote to memory of 2780 2976 audiodgi.exe 43 PID 2976 wrote to memory of 2780 2976 audiodgi.exe 43 PID 2976 wrote to memory of 2780 2976 audiodgi.exe 43 PID 2780 wrote to memory of 2940 2780 wmpmetwk.exe 44 PID 2780 wrote to memory of 2940 2780 wmpmetwk.exe 44 PID 2780 wrote to memory of 2940 2780 wmpmetwk.exe 44 PID 2780 wrote to memory of 2940 2780 wmpmetwk.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2264289f009d42213b66cffcbf5a10e3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RunescapeHack.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RunescapeHack.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RunescapeHack.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RunescapeHack.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe5⤵PID:2940
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD50d3766182ed84d9eefdd43b8a4455a06
SHA1718aa8c791ea243cfebf06ebe70e43e8d5040b25
SHA2560cc01f94732bc99086ce9a1db18f0e34466c112b87ceafeaa31f2fec5be0e65b
SHA512e9730586a72826053569b52be6f2d1a9a657e51b8f911c4379aee36a541c64c01ca3b51ad9eee16c227cf12caedda450be0251af43dbeff156177dd22973c9de
-
Filesize
10KB
MD5a6deb877c0f1f4ded2d2ad0b885824ce
SHA1b470b92025d3e85dde8f76cf46be9456d4692aec
SHA256484f423590c54da0296682b7e82ad33901f08f464415c10608f352c88f1b0782
SHA512d7d2b759431bfcce8649fc7b49cbccaa5b47e31661ab08932af058e3a7bccff8f0b60303e6d53fe0979f6b9378f487f41095f991096cb9270b6129b456159ff7
-
Filesize
242KB
MD52264289f009d42213b66cffcbf5a10e3
SHA1514a24dd120158bcfb5f1e3ce9b5e239bd96c43d
SHA2562305bde763611feb701816efdf831e878e28bd0091c06f3475b6706973343894
SHA5122acacb25a27beb28b0b3ba0ef75f0e0d98076778d6d244586b75b09f0b12d3432f7bcd588a6bcf50652b6ca584d2c815304c83f1a5b485f24b9799b10a9081b5