Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
-
Size
88KB
-
MD5
63623f925d63a400ebf84fd5722fa73e
-
SHA1
8da91204b0940633d31df941f9c5a1d707f669d8
-
SHA256
5a00d6f468e02f8c267e713afb157c58cbf1e9cd32db7f8723ec148663c225e4
-
SHA512
76772529b5df3ba498e023896a1ccb623106c3c191498015293bc946e773c098274d49c9083418799af6c55f0fad9a5a8d0a04f3d47cb191b362cc4766724adc
-
SSDEEP
1536:RCcT79F9ZYyi/yp31ocAgYpG6Iv2NyxQAGsTmol0s:5TP3JnNAj6v2sTxl0s
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe = "C:\\Users\\Public\\HD-H83DF-384922-KO\\msngrnem.exe:*:Enabled:Windows Messenger v11" 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2580 msngrnem.exe 2212 msngrnem.exe -
Loads dropped DLL 3 IoCs
pid Process 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 2580 msngrnem.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Messenger v11 = "C:\\Users\\Public\\HD-H83DF-384922-KO\\msngrnem.exe" 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 msngrnem.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3032 set thread context of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 2580 set thread context of 2212 2580 msngrnem.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 2580 msngrnem.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3032 wrote to memory of 3056 3032 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2580 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2580 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2580 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2580 3056 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 31 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32 PID 2580 wrote to memory of 2212 2580 msngrnem.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"4⤵
- Executes dropped EXE
PID:2212
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD563623f925d63a400ebf84fd5722fa73e
SHA18da91204b0940633d31df941f9c5a1d707f669d8
SHA2565a00d6f468e02f8c267e713afb157c58cbf1e9cd32db7f8723ec148663c225e4
SHA51276772529b5df3ba498e023896a1ccb623106c3c191498015293bc946e773c098274d49c9083418799af6c55f0fad9a5a8d0a04f3d47cb191b362cc4766724adc