Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe
-
Size
29KB
-
MD5
457f7ae9a5c5ea3b92302ad704cf9334
-
SHA1
b2a6e37ee3ae1a2b9d6cba55429450b16b79254d
-
SHA256
c9fad75d64365c108b7be0a9cf44ef500db8dd2bfb7735fb6610e355620ff47b
-
SHA512
a1fae7cf0787ff7bd2d0eadeeddd5c877d51b3273f6565bcf5355a7518221c09e190abb909a74dfeda15a68f47faeed626e14a29ccc42f1ffb0c5bfdc1cdb86c
-
SSDEEP
384:21AwaNBftLAZoUiRpYFUyO1MCsKmmfsI8YETlEDfOM1I:UAvLZ+jbssI8pT0fOM1I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\ProgramData\\Microsoft\\svchost.exe\"" 457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe:*:Enabled:KL" 457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3808 1400 WerFault.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\457f7ae9a5c5ea3b92302ad704cf9334_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 2202⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1400 -ip 14001⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1