Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
-
Size
32KB
-
MD5
249a0a3a9754d9135d82fef8e484bb82
-
SHA1
fa7606c6e6c6207fe64f792234b6531fd056a066
-
SHA256
ce23c2cf4d6bb1fced1f853415decaecedc9d375b98a4c0de85c8cf3a7cc139c
-
SHA512
f420a5969035c52fda884849749f33eb35547f17cd7525e1872270cbfae3434598a0788b778e9c227ddb93b9d6199718f9240278323b330d4f96939faa00d7ca
-
SSDEEP
384:tWNtx2tdRBOmtqKQq1UW1+jUN/PwyL7rmMBQEQDdim5LtCYPHYqzN50gYPkZo:tWN2tjrtks9tQpimJ74qix
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\c:\program files (x86)\bcd_installed.exe = "c:\\program files (x86)\\bcd_installed.exe:*:Enabled:Windows Application Service" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\mW[íµˆÖ¾`=µú¾˜v%S8’ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Deletes itself 1 IoCs
pid Process 2516 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 bcd_installed.exe -
Loads dropped DLL 4 IoCs
pid Process 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 1936 bcd_installed.exe 1936 bcd_installed.exe 1936 bcd_installed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files (x86)\bcd_installed.exe 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\bcd_installed.exe 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 2644 reg.exe 2592 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 1936 bcd_installed.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 2860 wrote to memory of 1936 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2032 1936 bcd_installed.exe 29 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 1936 wrote to memory of 2740 1936 bcd_installed.exe 30 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2032 wrote to memory of 2592 2032 cmd.exe 33 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2740 wrote to memory of 2644 2740 cmd.exe 34 PID 2860 wrote to memory of 2516 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 36 PID 2860 wrote to memory of 2516 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 36 PID 2860 wrote to memory of 2516 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 36 PID 2860 wrote to memory of 2516 2860 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\program files (x86)\bcd_installed.exe"c:\program files (x86)\bcd_installed.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ3⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "c:\program files (x86)\bcd_installed.exe" /t REG_SZ /d "c:\program files (x86)\bcd_installed.exe:*:Enabled:Windows Application Service" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "c:\program files (x86)\bcd_installed.exe" /t REG_SZ /d "c:\program files (x86)\bcd_installed.exe:*:Enabled:Windows Application Service" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2644
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\melt1.bat2⤵
- Deletes itself
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254B
MD5f2e38a83a51c7643e998c67be78610a6
SHA1b78208980fb662f7863242e395c9e17a25383722
SHA256773dee9687f17059e5ab111d5684b5e72b0c09d6de940d60eebaa2fe1f3127f4
SHA512190a1191c728bae8c678f2a6f3e9e70b434f95a2935563fe2467541175dcbd8af89c7aabf6bc9e3523cb35a9b5f96cdad16f80c93fbe148fa4d6541e793b68cd
-
Filesize
32KB
MD5249a0a3a9754d9135d82fef8e484bb82
SHA1fa7606c6e6c6207fe64f792234b6531fd056a066
SHA256ce23c2cf4d6bb1fced1f853415decaecedc9d375b98a4c0de85c8cf3a7cc139c
SHA512f420a5969035c52fda884849749f33eb35547f17cd7525e1872270cbfae3434598a0788b778e9c227ddb93b9d6199718f9240278323b330d4f96939faa00d7ca