Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe
-
Size
620KB
-
MD5
3f9cfb67ebd2341c2c957a5b87af1889
-
SHA1
d7557ba41709cd6ae80ef36c8014ffc9a3648057
-
SHA256
89f257a2dfba048462cebd4a907893ffcdd4e5be28e6781005d09c168786c0c2
-
SHA512
f45d45e2fe094047ef2fee03543ae57bdc59fd7303e4a9fcf86e800de9671c05e71ac2f2e1c4bd2f0b272fbe9fee2485b76f53df0ebb2d1956541cf7c6031e2a
-
SSDEEP
3072:eoQuPlkT0/G1bMqPVPQ3PTB8r0Sqz2Nq2QUa3G:RJeTF1Yy1GTWOQqfG
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winserv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winserv.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools winserv.exe -
Deletes itself 1 IoCs
pid Process 880 winserv.exe -
Executes dropped EXE 1 IoCs
pid Process 880 winserv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winserv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winserv.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies winserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 winserv.exe File created C:\Windows\SysWOW64\rdriv.sys winserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 winserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE winserv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winserv.exe 3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe File opened for modification C:\Windows\winserv.exe 3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" winserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" winserv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ winserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" winserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" winserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" winserv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" winserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f9cfb67ebd2341c2c957a5b87af1889_JaffaCakes118.exe"1⤵
- Looks for VMWare Tools registry key
- Drops file in Windows directory
PID:3672
-
C:\Windows\winserv.exe"C:\Windows\winserv.exe"1⤵
- Modifies security service
- Windows security bypass
- Looks for VMWare Tools registry key
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD53f9cfb67ebd2341c2c957a5b87af1889
SHA1d7557ba41709cd6ae80ef36c8014ffc9a3648057
SHA25689f257a2dfba048462cebd4a907893ffcdd4e5be28e6781005d09c168786c0c2
SHA512f45d45e2fe094047ef2fee03543ae57bdc59fd7303e4a9fcf86e800de9671c05e71ac2f2e1c4bd2f0b272fbe9fee2485b76f53df0ebb2d1956541cf7c6031e2a