Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe
-
Size
248KB
-
MD5
392b89e5ce05654d4b34bb690864211e
-
SHA1
a25cbd43b4d00112eb9da32e2fb4d60f3454ef74
-
SHA256
49c0d981886a33791800a13e7d0a77f92c6f98387d4692a1fd47f9811e05b180
-
SHA512
1dd6a5b21b09c5b8f43f30ebb2c54b18504a098e59ec7312568c232d1ba4d6dcf136ffae69dbf85c8f902c6206ab4bc50042a2106f49c4640699b32b0814946a
-
SSDEEP
6144:SzbZ1cDY/IbErO2vIHnYgYtiwpScwqI7cucC2TruOY0azYAtWQnLpN5OUXQmr++3:SzYDY/qErO2vIHngtiwp7wqIoucC2TrS
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications msconfig.exe -
Executes dropped EXE 3 IoCs
pid Process 1952 msconfig.exe 5028 msconfig.exe 5104 msconfig.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 msconfig.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 632 set thread context of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 4604 set thread context of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 1952 set thread context of 5028 1952 msconfig.exe 87 PID 5028 set thread context of 5104 5028 msconfig.exe 88 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1440 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 1440 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe 5104 msconfig.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 1952 msconfig.exe 5028 msconfig.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 632 wrote to memory of 4604 632 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 82 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 4604 wrote to memory of 1440 4604 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 83 PID 1440 wrote to memory of 1952 1440 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 86 PID 1440 wrote to memory of 1952 1440 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 86 PID 1440 wrote to memory of 1952 1440 392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe 86 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 1952 wrote to memory of 5028 1952 msconfig.exe 87 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88 PID 5028 wrote to memory of 5104 5028 msconfig.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392b89e5ce05654d4b34bb690864211e_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"6⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5392b89e5ce05654d4b34bb690864211e
SHA1a25cbd43b4d00112eb9da32e2fb4d60f3454ef74
SHA25649c0d981886a33791800a13e7d0a77f92c6f98387d4692a1fd47f9811e05b180
SHA5121dd6a5b21b09c5b8f43f30ebb2c54b18504a098e59ec7312568c232d1ba4d6dcf136ffae69dbf85c8f902c6206ab4bc50042a2106f49c4640699b32b0814946a