Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 16:14
Behavioral task
behavioral1
Sample
5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe
-
Size
400KB
-
MD5
5820a8e57fa4d637879cb497a8888cc1
-
SHA1
069d0e2bb993df8d94bfae8d7932be4aa1926ce2
-
SHA256
25b2db6412500a86c7a47ad4d88fe9d556cf677e50214355ddc0d34a620bbaf9
-
SHA512
086bb7b98c8e948df20dbf70a5e01a24fa8a4490923fbd8e932d20e3272b76997b182f279be2e0929c2eb05fe5971e43b9619197f9bbed99b40251d672620c57
-
SSDEEP
768:GsNLIk+WHQYNqPH6aRdyXDjbBJ3+seF+4WOJ:kkDH+PH9dyzj7eF/
Malware Config
Extracted
phorphiex
http://185.215.113.93/
http://gimmefile.top/
http://feedmefile.top/
http://gotsomefile.top/
http://185.215.113.66/
15DBeUGFSQLbpYvWLJwzHUXSRrHNU9uQuS8c2wvFLZ7Nxz3N
1E5ZxnNUbbGQarWjMA7tCwp3Btm38GvRkv
3AcMV5pSUcxMmmcMbfSkJXRKbCrF3ysUDJ
bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr
XkcKjKZqNUkChwJXMj5uDjDns6etXvakir
D7MYki8urW3xq8sZJ8Q2v2ZrHxjzp7ACvb
0x76e4CB2fcf7f931Fd750e93F443536Ee068d1cdE
LfYFvpk2hccXw12tN3BBMWh7EcUBMbKoTG
rUQFcff9R1eKAwTtR1wbuQxmcoB236mz44
TEUaG7jyXdyrDS3JeEg1w1hotmmEMjx4TB
t1gTRxsrEXwky32j22jgFRZAafBzmCV2M2V
AT5Vm3ZrUg98s9kBue2g9YjnwK4kFKhQw3
bitcoincash:qqucl3fev20z4upudppa8p5hd6j3zzgyfuwae00pfr
44L2q3sPJ3DMJZiuSpHvehHMLbMXx3SAoVbLm5DWDw1A7PhUvcCPAGg5qAN98DWAUG7CuD4WmydP4JkewTz2aeVd4qhS822
GBLUYL3QTKP3NXVWCYNZ7ZH4CWFT6PVCXEYCNUNSHM34WKG2UL5EDQMV
bnb154sx9pdh8er33ujxlpfk3zwvlfp9rd5rskvvgc
bc1qn4r93am7rxxr4a5dwydhwx0p2kd4xfd7mz42f3
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
winblrsnrcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" winblrsnrcs.exe -
Phorphiex payload 2 IoCs
Processes:
resource yara_rule C:\274051334913836\spoolsv.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\1481638898.exe family_phorphiex -
Processes:
spoolsv.exesylsplvc.exewinblrsnrcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" spoolsv.exe -
Executes dropped EXE 6 IoCs
Processes:
spoolsv.exe1481638898.exesylsplvc.exe2277522949.exewinblrsnrcs.exe2363714522.exepid process 3972 spoolsv.exe 5092 1481638898.exe 388 sylsplvc.exe 3944 2277522949.exe 4068 winblrsnrcs.exe 3784 2363714522.exe -
Processes:
spoolsv.exesylsplvc.exewinblrsnrcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe1481638898.exe2277522949.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\274051334913836\\spoolsv.exe" 5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sylsplvc.exe" 1481638898.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winblrsnrcs.exe" 2277522949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\274051334913836\\spoolsv.exe" 5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
Processes:
1481638898.exe2277522949.exedescription ioc process File created C:\Windows\sylsplvc.exe 1481638898.exe File opened for modification C:\Windows\sylsplvc.exe 1481638898.exe File created C:\Windows\winblrsnrcs.exe 2277522949.exe File opened for modification C:\Windows\winblrsnrcs.exe 2277522949.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exespoolsv.exe1481638898.exesylsplvc.exe2277522949.exedescription pid process target process PID 5028 wrote to memory of 3972 5028 5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe spoolsv.exe PID 5028 wrote to memory of 3972 5028 5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe spoolsv.exe PID 5028 wrote to memory of 3972 5028 5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe spoolsv.exe PID 3972 wrote to memory of 5092 3972 spoolsv.exe 1481638898.exe PID 3972 wrote to memory of 5092 3972 spoolsv.exe 1481638898.exe PID 3972 wrote to memory of 5092 3972 spoolsv.exe 1481638898.exe PID 5092 wrote to memory of 388 5092 1481638898.exe sylsplvc.exe PID 5092 wrote to memory of 388 5092 1481638898.exe sylsplvc.exe PID 5092 wrote to memory of 388 5092 1481638898.exe sylsplvc.exe PID 388 wrote to memory of 3944 388 sylsplvc.exe 2277522949.exe PID 388 wrote to memory of 3944 388 sylsplvc.exe 2277522949.exe PID 388 wrote to memory of 3944 388 sylsplvc.exe 2277522949.exe PID 3944 wrote to memory of 4068 3944 2277522949.exe winblrsnrcs.exe PID 3944 wrote to memory of 4068 3944 2277522949.exe winblrsnrcs.exe PID 3944 wrote to memory of 4068 3944 2277522949.exe winblrsnrcs.exe PID 388 wrote to memory of 3784 388 sylsplvc.exe 2363714522.exe PID 388 wrote to memory of 3784 388 sylsplvc.exe 2363714522.exe PID 388 wrote to memory of 3784 388 sylsplvc.exe 2363714522.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5820a8e57fa4d637879cb497a8888cc1_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\274051334913836\spoolsv.exeC:\274051334913836\spoolsv.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\1481638898.exeC:\Users\Admin\AppData\Local\Temp\1481638898.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\sylsplvc.exeC:\Windows\sylsplvc.exe4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\2277522949.exeC:\Users\Admin\AppData\Local\Temp\2277522949.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\winblrsnrcs.exeC:\Windows\winblrsnrcs.exe6⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\2363714522.exeC:\Users\Admin\AppData\Local\Temp\2363714522.exe5⤵
- Executes dropped EXE
PID:3784
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD55820a8e57fa4d637879cb497a8888cc1
SHA1069d0e2bb993df8d94bfae8d7932be4aa1926ce2
SHA25625b2db6412500a86c7a47ad4d88fe9d556cf677e50214355ddc0d34a620bbaf9
SHA512086bb7b98c8e948df20dbf70a5e01a24fa8a4490923fbd8e932d20e3272b76997b182f279be2e0929c2eb05fe5971e43b9619197f9bbed99b40251d672620c57
-
Filesize
86KB
MD5fe1e93f12cca3f7c0c897ef2084e1778
SHA1fb588491ddad8b24ea555a6a2727e76cec1fade3
SHA2562ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f
SHA51236e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93
-
Filesize
79KB
MD51e8a2ed2e3f35620fb6b8c2a782a57f3
SHA1e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
SHA2563f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
SHA512ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade
-
Filesize
18KB
MD5c53b73c89515e712a301a9d17e313900
SHA1154b857b1ceec6938851e57baa0861b6a1fceb16
SHA2566e24c56691c01a191e88f193966e04000fe5b83caa9b5adb4afebbd6cc717c68
SHA512eeefbefd1c36f8493c58cda9dbfa9ae6580a7507fb99f1deb3f869348a7e92d702cdae50c4f035b31303717984b4282fa9777e92fdd1a0c70ec32f4e7063efc0
-
Filesize
10KB
MD59d3a5017e86fd5e182ca58c8293ffa3e
SHA1242a24a7cda4f7c7a87c19c1ce036227b48f8235
SHA256c339b1bf9947ba07e9203ebfdd6f41cf8414f4ef795d528c8f768eab0d136586
SHA512009a35103362a59f83100425c702bf0072be3a3fa1afd508bc530f26a2b78f607ec70ffc4a2c929596943864b1a507a1ff4714bbfb4784d44d8dfa22084b710b