Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe
-
Size
152KB
-
MD5
325db41b12d32ad50603385ca14472a7
-
SHA1
8dbb38ed9fdc48daf226c642744b3235695c8352
-
SHA256
aea17fe91c0282671abc69c6260e04eab833948570d3cf869756151e473957c0
-
SHA512
c4666471f16fc3e6202ca73157f7c85872429567fb4de6baf0b44c1f3476671746709bc739e4267556d2094075759c3a32efd13a351f30ac82876ed11fef0082
-
SSDEEP
3072:+3bJADd+outSPre9xJ00s6ehgZOHOrD1KA24t2Mt2TR:QJ5oSee3chgZzKsL4TR
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\1900:UDP = "1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007" 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\2869:TCP = "2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008" 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe:*:Enabled:@xpsp2res.dll,-22005" 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\12808:TCP = "12808:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NvGraphicsInterface = "C:\\Users\\Admin\\AppData\\Local\\Temp\\325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe" 325db41b12d32ad50603385ca14472a7_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1