Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
5d58cbbb294b8869e62da1558042f78b
-
SHA1
0f1c88b1e6304cc4fe0e196d85e217d26e1b398f
-
SHA256
8fa2ea30c983fcccf825cf0983932b6cd834229b8e7ac11fa2060ca66c203c11
-
SHA512
506b97a2c3ea1b6cce3220efcef84470f8d11c21e34d25cd92c0757deb0be880ca3324c888deb45fac23986cb6e674a430502a210f9853000a9ce3613a36395f
-
SSDEEP
24576:qCVoOmFAR1NSYJv2vVRCn4dACvyj/dw6uXg/OL4d5IkvEOH:qeb+APIYJv2ds4dzyiQVWO
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Arquivos de programas\Internet Explorer\6.5\ccmsi.exe = "C:\\Arquivos de programas\\Internet Explorer\\6.5\\ccmsi.exe:*:Enabled:ccmsi.exe" 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\System\Controlset001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:\\Windows\\drbplg.exe" 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe -
Kills process with taskkill 2 IoCs
pid Process 2684 taskkill.exe 2760 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe Token: SeDebugPrivilege 2684 taskkill.exe Token: SeDebugPrivilege 2760 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2684 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2684 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2684 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2684 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2760 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2760 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2760 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2760 2152 5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d58cbbb294b8869e62da1558042f78b_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ashMaiSv.exe -im mcvsftsn.exe -im Mcdetect.exe -im McTskshd.exe -im mcvsshld.exe -im McVSEscn.exe -im McShield.exe -im mcagent.exe -im oasclnt.exe -im nod32kui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ashMaiSv.exe -im mcvsftsn.exe -im Mcdetect.exe -im McTskshd.exe -im mcvsshld.exe -im McVSEscn.exe -im McShield.exe -im mcagent.exe -im oasclnt.exe -im nod32kui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1