Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe
-
Size
189KB
-
MD5
46c0c7389221733ef367a47614bcd683
-
SHA1
2453191977629235cc8a9ef81e64dcda2f7cd5dc
-
SHA256
05036cdefed1e2e405eb6b288aacf6c2df59e780de8c2493d76fc14c0b42aa8b
-
SHA512
6704d1a2e72d99523e87ab36331acafd86f5802ef05bd7dba5169f5c9814da0718e141331a1c8c7e405b7169de6994ce8d4ed84fe8b68b068745524f28c54d93
-
SSDEEP
3072:GEHGP1HGCqWpkmP46b5NOiT8zMMJDRQN2ajzKUx+WJ26sBSZjVIidm3ZMFRJwdT3:GEmPlpk846FNOiTQDtRQzjGeRZ5NjRaJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe QQ.exe" 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\ 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\2046:TCP = "2046:TCP:*:Enabled" 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\QQ.exe 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe File created C:\Windows\SysWOW64\QQ.exe 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe File created C:\Windows\SysWOW64\QQ.dll 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe File created C:\Windows\SysWOW64\QQHook.dll 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2520 wrote to memory of 768 2520 46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe 8
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46c0c7389221733ef367a47614bcd683_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1