Analysis
-
max time kernel
95s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe
-
Size
637KB
-
MD5
336f543c219677b74be44e57cb8421f6
-
SHA1
4e248c13f6642ab071951ea0a0da60f40945c249
-
SHA256
fb69ca283d2ffeb1542697e9d8c87d428170c42b27a8a48413a2de7ac4480128
-
SHA512
0df14d8fe42a3e67a9619723accb31aa4b106f12857d20c4d6daa967b76458ee489c420611e3c49b951c1d86356f4234c349cff239e1e288bcac51630f918127
-
SSDEEP
12288:4HtiBU0/0//Q0wBxtrUgp/m9HIduvlG4KCFVI7bPG2zjFSf+CPHJYPqDsE:4h0S3wf4HVvlGcFe/PG2zjFA+uHaP6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4120 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 lsas.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lsas.exe 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3300 wrote to memory of 868 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 84 PID 3300 wrote to memory of 868 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 84 PID 3300 wrote to memory of 868 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 84 PID 3300 wrote to memory of 4120 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 85 PID 3300 wrote to memory of 4120 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 85 PID 3300 wrote to memory of 4120 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 85 PID 868 wrote to memory of 2080 868 net.exe 89 PID 868 wrote to memory of 2080 868 net.exe 89 PID 868 wrote to memory of 2080 868 net.exe 89 PID 3300 wrote to memory of 2348 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 90 PID 3300 wrote to memory of 2348 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 90 PID 3300 wrote to memory of 2348 3300 336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\336f543c219677b74be44e57cb8421f6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\net.exenet stop alg2⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop alg3⤵PID:2080
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4120
-
-
C:\Windows\SysWOW64\lsas.exeC:\Windows\system32\lsas.exe2⤵
- Executes dropped EXE
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5a0948614f59ed27d363cd1842a666a08
SHA13d18b672470a19f9237a6296bdf2c7a0863e227c
SHA256c42e586edfb04efdf2121bff9737afcaca0afe43d2ea988e28c55a6d2d78fc55
SHA512869558c38f0f65beb4678a33df154e4fafe0e74c51e94a4a3e733a84ac49aaa7fcc5e9905ba28b0a9e3e1ff6098052cef5b3439f2710391254c5500aedf71016