Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 09:07
Behavioral task
behavioral1
Sample
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
-
Size
410KB
-
MD5
3880ca7706869ac27a222cd9999264af
-
SHA1
0159759add921aae85ef21d57ee6c4201017fe16
-
SHA256
9a3498f594d05341417167964592c6b1935c7969009728bd22b481e0167c9d63
-
SHA512
051e144770adb0b773454008e5e551133c7592a30705847b3cafa1531a9b8168f125be092151fef4214e7259eb06543dbc8c74164c7da7eb460766a37f308bb6
-
SSDEEP
12288:qnNhuBoY8SorxgmA+nlvVloVks0ZoTFR4U:qPatCg7EPOVZmooU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1604 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 csrcs.exe -
Loads dropped DLL 7 IoCs
pid Process 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1972 csrcs.exe 1972 csrcs.exe -
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x000d000000012284-13.dat upx behavioral1/memory/3024-16-0x00000000052C0000-0x0000000005352000-memory.dmp upx behavioral1/memory/1972-50-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/3024-59-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1972-50-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe behavioral1/memory/3024-59-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2612 PING.EXE 2344 PING.EXE 2592 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1972 csrcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1972 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1972 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1972 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1972 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 31 PID 1972 wrote to memory of 2604 1972 csrcs.exe 32 PID 1972 wrote to memory of 2604 1972 csrcs.exe 32 PID 1972 wrote to memory of 2604 1972 csrcs.exe 32 PID 1972 wrote to memory of 2604 1972 csrcs.exe 32 PID 2604 wrote to memory of 2592 2604 cmd.exe 34 PID 2604 wrote to memory of 2592 2604 cmd.exe 34 PID 2604 wrote to memory of 2592 2604 cmd.exe 34 PID 2604 wrote to memory of 2592 2604 cmd.exe 34 PID 3024 wrote to memory of 1604 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 35 PID 3024 wrote to memory of 1604 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 35 PID 3024 wrote to memory of 1604 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 35 PID 3024 wrote to memory of 1604 3024 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 35 PID 1604 wrote to memory of 2612 1604 cmd.exe 37 PID 1604 wrote to memory of 2612 1604 cmd.exe 37 PID 1604 wrote to memory of 2612 1604 cmd.exe 37 PID 1604 wrote to memory of 2612 1604 cmd.exe 37 PID 2604 wrote to memory of 2344 2604 cmd.exe 38 PID 2604 wrote to memory of 2344 2604 cmd.exe 38 PID 2604 wrote to memory of 2344 2604 cmd.exe 38 PID 2604 wrote to memory of 2344 2604 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:2592
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- Runs ping.exe
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD54ecd5d8bc840d6823aed1ea7aced3a25
SHA1991beedfe806d3ffc66272b81f6b2c69feb747fb
SHA256a9ee7221d901f93b3ef51b7506e4ec2715438c862a3ac6d9d71c81a7afb08757
SHA512bc403b7e2a66e50065e0becdcba1ca8ddcd782ddc4739d753d36d73ada52a7049e66f3f6f4bf9c9504a33193af41833958d5b99b449a5383be9b7171e99d331f
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD5d7c09bd67c420693c3104a3bcb359a4d
SHA1ccf340fd408e0ab177c12a4c46dd35a157c361a2
SHA2561a0158c2784f1360310c5f3785bb2293ad35f8ac2b6096defe5b89122cc019c9
SHA512da6917075c3ea8ee8b6925ff3206fd12af0f2fecb279324deb8d6217f39707df308b69684439bac1c2b6e3c46f75ba8c54b8c8dbbc05f00cfbca44207a9961ae
-
Filesize
410KB
MD53880ca7706869ac27a222cd9999264af
SHA10159759add921aae85ef21d57ee6c4201017fe16
SHA2569a3498f594d05341417167964592c6b1935c7969009728bd22b481e0167c9d63
SHA512051e144770adb0b773454008e5e551133c7592a30705847b3cafa1531a9b8168f125be092151fef4214e7259eb06543dbc8c74164c7da7eb460766a37f308bb6