Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe
-
Size
616KB
-
MD5
46a1efd85ea6d9faf9cb018e27448a42
-
SHA1
0a26f1fbe712a6de21dc1c7cac5e2a86f0f60674
-
SHA256
d739c8297f94d88e014667e5e115521ada6aaad7f248a8e6a0f3e15612513c83
-
SHA512
99eab08d1e868f73f70fa0d34cead99349a1984d486a03413d5ac7fd7c674c6a0fe91ca3a8d0df362efdcf7bf83451cd554d59cb4873666df4c67491fae86098
-
SSDEEP
6144:+CVf8/j9ks/0AvfkYfRPIz/FD++mUGPVRgZZi8nXZdjend/pTr:VVf8/j9ks/TxfaePOpy
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchss.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchss.exe" svchss.exe -
Executes dropped EXE 2 IoCs
pid Process 1988 svchss.exe 2512 svchss.exe -
Loads dropped DLL 3 IoCs
pid Process 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 1988 svchss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchss.exe" svchss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchss.exe" svchss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 1988 set thread context of 2512 1988 svchss.exe 32 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 2512 svchss.exe 2512 svchss.exe 2512 svchss.exe 2512 svchss.exe 2512 svchss.exe 2512 svchss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 1988 svchss.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2356 2316 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 30 PID 2356 wrote to memory of 1988 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 31 PID 2356 wrote to memory of 1988 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 31 PID 2356 wrote to memory of 1988 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 31 PID 2356 wrote to memory of 1988 2356 46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32 PID 1988 wrote to memory of 2512 1988 svchss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\46a1efd85ea6d9faf9cb018e27448a42_JaffaCakes118.exeFalse2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\svchss.exe"C:\Users\Admin\AppData\Roaming\svchss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\svchss.exeFalse4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
616KB
MD546a1efd85ea6d9faf9cb018e27448a42
SHA10a26f1fbe712a6de21dc1c7cac5e2a86f0f60674
SHA256d739c8297f94d88e014667e5e115521ada6aaad7f248a8e6a0f3e15612513c83
SHA51299eab08d1e868f73f70fa0d34cead99349a1984d486a03413d5ac7fd7c674c6a0fe91ca3a8d0df362efdcf7bf83451cd554d59cb4873666df4c67491fae86098