Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 09:07
Behavioral task
behavioral1
Sample
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe
-
Size
410KB
-
MD5
3880ca7706869ac27a222cd9999264af
-
SHA1
0159759add921aae85ef21d57ee6c4201017fe16
-
SHA256
9a3498f594d05341417167964592c6b1935c7969009728bd22b481e0167c9d63
-
SHA512
051e144770adb0b773454008e5e551133c7592a30705847b3cafa1531a9b8168f125be092151fef4214e7259eb06543dbc8c74164c7da7eb460766a37f308bb6
-
SSDEEP
12288:qnNhuBoY8SorxgmA+nlvVloVks0ZoTFR4U:qPatCg7EPOVZmooU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1372 csrcs.exe -
resource yara_rule behavioral2/memory/1776-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a0000000234f2-13.dat upx behavioral2/memory/1372-71-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1372-83-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1776-88-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1372-83-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe behavioral2/memory/1776-88-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2692 PING.EXE 4440 PING.EXE 2900 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 1372 csrcs.exe 1372 csrcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1372 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 86 PID 1776 wrote to memory of 1372 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 86 PID 1776 wrote to memory of 1372 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 86 PID 1372 wrote to memory of 716 1372 csrcs.exe 88 PID 1372 wrote to memory of 716 1372 csrcs.exe 88 PID 1372 wrote to memory of 716 1372 csrcs.exe 88 PID 716 wrote to memory of 2692 716 cmd.exe 90 PID 716 wrote to memory of 2692 716 cmd.exe 90 PID 716 wrote to memory of 2692 716 cmd.exe 90 PID 1776 wrote to memory of 4520 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 91 PID 1776 wrote to memory of 4520 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 91 PID 1776 wrote to memory of 4520 1776 3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe 91 PID 4520 wrote to memory of 4440 4520 cmd.exe 93 PID 4520 wrote to memory of 4440 4520 cmd.exe 93 PID 4520 wrote to memory of 4440 4520 cmd.exe 93 PID 716 wrote to memory of 2900 716 cmd.exe 94 PID 716 wrote to memory of 2900 716 cmd.exe 94 PID 716 wrote to memory of 2900 716 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3880ca7706869ac27a222cd9999264af_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:2692
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:2900
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- Runs ping.exe
PID:4440
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD54ecd5d8bc840d6823aed1ea7aced3a25
SHA1991beedfe806d3ffc66272b81f6b2c69feb747fb
SHA256a9ee7221d901f93b3ef51b7506e4ec2715438c862a3ac6d9d71c81a7afb08757
SHA512bc403b7e2a66e50065e0becdcba1ca8ddcd782ddc4739d753d36d73ada52a7049e66f3f6f4bf9c9504a33193af41833958d5b99b449a5383be9b7171e99d331f
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD5d7c09bd67c420693c3104a3bcb359a4d
SHA1ccf340fd408e0ab177c12a4c46dd35a157c361a2
SHA2561a0158c2784f1360310c5f3785bb2293ad35f8ac2b6096defe5b89122cc019c9
SHA512da6917075c3ea8ee8b6925ff3206fd12af0f2fecb279324deb8d6217f39707df308b69684439bac1c2b6e3c46f75ba8c54b8c8dbbc05f00cfbca44207a9961ae
-
Filesize
410KB
MD53880ca7706869ac27a222cd9999264af
SHA10159759add921aae85ef21d57ee6c4201017fe16
SHA2569a3498f594d05341417167964592c6b1935c7969009728bd22b481e0167c9d63
SHA512051e144770adb0b773454008e5e551133c7592a30705847b3cafa1531a9b8168f125be092151fef4214e7259eb06543dbc8c74164c7da7eb460766a37f308bb6