Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe
-
Size
763KB
-
MD5
28ebcfc73212d13178d68e0e32b001f4
-
SHA1
9de85d01dfb659ffae6577c54a1f557f48dfac10
-
SHA256
7cb9126bfd86bac64cb3c0f9069f8abf9447bfc30372555bf6a0c85e3c9be5f0
-
SHA512
81ebe9218afb55d7b9648f7939e032439d2afcf5a874d3bf17b50abdc4ec3dd2d5f66b624e50b26ab8394c00271a6048860483e46f462fc43c8600f7ac4edb5b
-
SSDEEP
12288:10JQJ6CyVWk7yMkKo+ma4e9+JfWzuq2Bh57KNTVZg10Cdm4hIcrJ74KwQEQuILFg:6V5yMkXZPMyBhhcWxI2kknUnk3nnU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" trojan.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" trojan.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} trojan.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" trojan.exe -
Executes dropped EXE 2 IoCs
pid Process 2512 trojan.exe 3960 fservice.exe -
resource yara_rule behavioral2/memory/2512-6-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-16-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-15-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-13-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-9-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-26-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral2/memory/2512-33-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\trojan = "C:\\Users\\Admin\\AppData\\Roaming\\klickpro.exe" 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ trojan.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe trojan.exe File opened for modification C:\Windows\SysWOW64\fservice.exe trojan.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\sservice.exe trojan.exe File opened for modification C:\Windows\system\sservice.exe trojan.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2784 wrote to memory of 2512 2784 28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe 85 PID 2512 wrote to memory of 3960 2512 trojan.exe 86 PID 2512 wrote to memory of 3960 2512 trojan.exe 86 PID 2512 wrote to memory of 3960 2512 trojan.exe 86 PID 2512 wrote to memory of 1040 2512 trojan.exe 89 PID 2512 wrote to memory of 1040 2512 trojan.exe 89 PID 2512 wrote to memory of 1040 2512 trojan.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28ebcfc73212d13178d68e0e32b001f4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\trojan.exeC:\Users\Admin\AppData\Roaming\trojan.exe2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\trojan.exe.bat3⤵PID:1040
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b44ffb344d89483ebc1647515eb57e3f
SHA1edbdc15551759c9b05090848d1dbd9be3e1e2c31
SHA2567b7f6a2190a07c4e31d60ed091d1fe2e02e8a1413fb866368086bd74d4183cca
SHA5128537bc84d2c489ea01c420698808d122e0ce83cbe2a36ed305269142893e72df2f5ca4795896452532f9c550e21b9224c563a0d4186f9843776b8604d7e75d25
-
Filesize
123B
MD5f76a0a373d3930f4081bd20a5fa7aaab
SHA1b140e48a86a8c76e754d5a51e50e07476386da4f
SHA256d468d3fa9b96115841d49db2ebbca62b57c2a1955786f4cf2eb349edf3fe38f1
SHA5124a35b2c664da007c2a171c1302c850781b7e818f86066c054ab11ab053c8b03d5166179354d4b8607ac8ffe1e2656eb43a876da5cdf3fb65dfa26b4944753290