Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe
-
Size
43KB
-
MD5
3ecce53b5f882c0ecb37f5cb0c0fd7f1
-
SHA1
c8f36c4a43c7f6be24aee4d6e94a6289ab131d9a
-
SHA256
62f24d243004248f7cea155a86e1e10a73b2d7b5f3163b1300b3e06737e09036
-
SHA512
89c5e45bed1ece42f9be0434ee2c443b022648a3b2cfbc0c188897d21e0517dbef6bbcc94a1184de758a9bd2104f53a244328babf061b4c802b5032a5872726a
-
SSDEEP
768:nV8XCTEzdPxT1logH+ooM8RxpzmtG9401xy0sGBNo7WAb11dgZ:r/gH+ooM8TptyZ8NoWQY
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\3355:TCP = "3355:TCP:*:Enabled:TCP\\IP" 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system\smss.exe = "C:\\Windows\\system\\smss.exe:*:Enabled:TCP\\IP" 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1680 netsh.exe 2760 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2160 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2160 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2160 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2160 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 30 PID 2160 wrote to memory of 1680 2160 cmd.exe 32 PID 2160 wrote to memory of 1680 2160 cmd.exe 32 PID 2160 wrote to memory of 1680 2160 cmd.exe 32 PID 2160 wrote to memory of 1680 2160 cmd.exe 32 PID 2112 wrote to memory of 1408 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 34 PID 2112 wrote to memory of 1408 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 34 PID 2112 wrote to memory of 1408 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 34 PID 2112 wrote to memory of 1408 2112 3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe 34 PID 1408 wrote to memory of 2760 1408 cmd.exe 36 PID 1408 wrote to memory of 2760 1408 cmd.exe 36 PID 1408 wrote to memory of 2760 1408 cmd.exe 36 PID 1408 wrote to memory of 2760 1408 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ecce53b5f882c0ecb37f5cb0c0fd7f1_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Windows\system\smss.exe TCP\IP Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Windows\system\smss.exe TCP\IP Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1