Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe
-
Size
98KB
-
MD5
420a8c73eb22a3ab0e2e00076a2a7568
-
SHA1
5c20b712b80c1937492d7bb1d018326f08006e58
-
SHA256
baf29a7ee8bcc2628ab1be770b134ec10621effd704cc2377a57ce6ed6e6de72
-
SHA512
dfca23330da961fcf63142b561f56d1906c84227c58878d34d192c1e6fcbd29c6a3c531a2c640d06edd4bde852ccf7fa1d9f724f9772ee1b2c5baf93a1a47f9e
-
SSDEEP
3072:bzmLXVZQPdYsVIFQ7BzckXeGVtv0W1fYnjwIRby7k2:e/QPdYsVIudneGVL1AFxM
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall SysScan\\cfmmon.exe" 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2908 cfmmon.exe 2832 cfmmon.exe -
Loads dropped DLL 3 IoCs
pid Process 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2908 cfmmon.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpUqglZb1gIQ.exe" 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfmmon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firewall SysScan\\cfmmon.exe" 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpUqglZb1gIQ.exe" cfmmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpUqglZb1gIQ.exe" cfmmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpUqglZb1gIQ.exe" 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2328 set thread context of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2908 set thread context of 2832 2908 cfmmon.exe 32 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 2908 cfmmon.exe 2908 cfmmon.exe 2908 cfmmon.exe 2908 cfmmon.exe 2908 cfmmon.exe 2908 cfmmon.exe 2908 cfmmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe Token: SeDebugPrivilege 2908 cfmmon.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2352 2328 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2908 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2908 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2908 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2908 2352 420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe 31 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32 PID 2908 wrote to memory of 2832 2908 cfmmon.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\420a8c73eb22a3ab0e2e00076a2a7568_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe" in3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe"C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe"4⤵
- Executes dropped EXE
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5a33856947e0ff31020ff9076dc6bc997
SHA137840a57715f9833e7eec24970f8499da0b7b28f
SHA256d49267b4e89a23ed73b62979c8fc519c3a924defce8fe337457d97d2b2c7228b
SHA5123476a7db04e629e66f3c524282711865d6ea00c42676c04fc2d1075c7b2f19ce74964877abe4b1699c93deb7564e2db76e5ca27ba85cbaf2d110de2e47f96387