Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe
-
Size
16KB
-
MD5
2c32f844e0cd375070e06bb9e0e215da
-
SHA1
20e1f35297d62e3cdc6ebbf8788649eed1854655
-
SHA256
93278a2db71873c7503dd0986c31c4b41d7ff649ef8cd07986278595e5e65933
-
SHA512
1265345ca01a7cdb5ae2de6ee3589feebf22967af0e25281a10222f8429fa507f667e5d4998d6173201c90bbf72713af673becb712b6f405c90f961954416a17
-
SSDEEP
192:f83msQ4B1Z8F274/JQtCBdH0dHRdHwdHPH1SdHK18G+j5P:f+mcB1Z8jxQtCBqrmuw+B
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\PrinterSecurityLayer = "C:\\Windows\\LSPRN.EXE" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\PrinterSecurityLayer = "C:\\Windows\\LSPRN.EXE" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "0" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "0" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "0" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "0" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 LSPRN.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Printer Driver = "C:\\Windows\\system32\\PRINTDRV.EXE" LSPRN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Printer Driver = "C:\\Windows\\system32\\PRINTDRV.EXE" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\LSPRN.EXE 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe File opened for modification C:\Windows\LSPRN.EXE 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\ 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck = "1" LSPRN.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\ LSPRN.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" LSPRN.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Security\DisableSecuritySettingsCheck = "1" 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2692 2000 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2692 2000 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2692 2000 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2692 2000 2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c32f844e0cd375070e06bb9e0e215da_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\LSPRN.EXE"C:\Windows\LSPRN.EXE"2⤵
- Adds policy Run key to start application
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD52c32f844e0cd375070e06bb9e0e215da
SHA120e1f35297d62e3cdc6ebbf8788649eed1854655
SHA25693278a2db71873c7503dd0986c31c4b41d7ff649ef8cd07986278595e5e65933
SHA5121265345ca01a7cdb5ae2de6ee3589feebf22967af0e25281a10222f8429fa507f667e5d4998d6173201c90bbf72713af673becb712b6f405c90f961954416a17