Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
-
Size
248KB
-
MD5
392b89e5ce05654d4b34bb690864211e
-
SHA1
a25cbd43b4d00112eb9da32e2fb4d60f3454ef74
-
SHA256
49c0d981886a33791800a13e7d0a77f92c6f98387d4692a1fd47f9811e05b180
-
SHA512
1dd6a5b21b09c5b8f43f30ebb2c54b18504a098e59ec7312568c232d1ba4d6dcf136ffae69dbf85c8f902c6206ab4bc50042a2106f49c4640699b32b0814946a
-
SSDEEP
6144:SzbZ1cDY/IbErO2vIHnYgYtiwpScwqI7cucC2TruOY0azYAtWQnLpN5OUXQmr++3:SzYDY/qErO2vIHngtiwp7wqIoucC2TrS
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List msconfig.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Executes dropped EXE 3 IoCs
pid Process 2704 msconfig.exe 2428 msconfig.exe 2724 msconfig.exe -
Loads dropped DLL 4 IoCs
pid Process 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 2704 msconfig.exe 2428 msconfig.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 msconfig.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2368 set thread context of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 1696 set thread context of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 2704 set thread context of 2428 2704 msconfig.exe 34 PID 2428 set thread context of 2724 2428 msconfig.exe 35 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 2724 msconfig.exe 2724 msconfig.exe 2724 msconfig.exe 2724 msconfig.exe 2724 msconfig.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 2704 msconfig.exe 2428 msconfig.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1696 2368 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 31 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 1696 wrote to memory of 2644 1696 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2704 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 33 PID 2644 wrote to memory of 2704 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 33 PID 2644 wrote to memory of 2704 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 33 PID 2644 wrote to memory of 2704 2644 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 33 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2704 wrote to memory of 2428 2704 msconfig.exe 34 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35 PID 2428 wrote to memory of 2724 2428 msconfig.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"6⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5392b89e5ce05654d4b34bb690864211e
SHA1a25cbd43b4d00112eb9da32e2fb4d60f3454ef74
SHA25649c0d981886a33791800a13e7d0a77f92c6f98387d4692a1fd47f9811e05b180
SHA5121dd6a5b21b09c5b8f43f30ebb2c54b18504a098e59ec7312568c232d1ba4d6dcf136ffae69dbf85c8f902c6206ab4bc50042a2106f49c4640699b32b0814946a