Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe
-
Size
44KB
-
MD5
658074f0770a6be10048e0c00d4a56af
-
SHA1
019f6890fe89eb79d117a827ea08e5e69d0e8dac
-
SHA256
52ee340152fd8b2aed4497ce08434c437d8b1fb455751897f192577f35545353
-
SHA512
373d4155a1e0e3e6b14e45104a456546d5aefba63fbaa2d4a16a258831983db18ed1b7ceac3543911391a00a276f3abd5f22b304086085d7860e2f2ffebe0c7b
-
SSDEEP
768:wl+RxOpPNN0nhpOA3JfHYBjgPI9di6N4xmhQhIUV5VekqgerEZH4sSnKeGzE:wl/NOx4BOCHBmeUVBerEZ/S/UE
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2188 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\file.bat 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe File created C:\Windows\services.exe 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe File opened for modification C:\Windows\services.exe 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe File created C:\Windows\file.bat services.exe File created C:\Windows\services.exe services.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Desktop services.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Desktop\id = "678526651511" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Desktop\host = "66.96.248.21" services.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2684 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2684 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2684 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2684 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2936 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 32 PID 2956 wrote to memory of 2936 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 32 PID 2956 wrote to memory of 2936 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 32 PID 2956 wrote to memory of 2936 2956 658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe 32 PID 2936 wrote to memory of 2808 2936 services.exe 33 PID 2936 wrote to memory of 2808 2936 services.exe 33 PID 2936 wrote to memory of 2808 2936 services.exe 33 PID 2936 wrote to memory of 2808 2936 services.exe 33 PID 2936 wrote to memory of 2840 2936 services.exe 35 PID 2936 wrote to memory of 2840 2936 services.exe 35 PID 2936 wrote to memory of 2840 2936 services.exe 35 PID 2936 wrote to memory of 2840 2936 services.exe 35 PID 2840 wrote to memory of 2188 2840 cmd.exe 37 PID 2840 wrote to memory of 2188 2840 cmd.exe 37 PID 2840 wrote to memory of 2188 2840 cmd.exe 37 PID 2840 wrote to memory of 2188 2840 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\658074f0770a6be10048e0c00d4a56af_JaffaCakes118.exe"1⤵
- Windows security bypass
- Windows security modification
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"2⤵PID:2684
-
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5ee3c16a6e1cc9ee088d4ce6f03bd9f6d
SHA1213ab6b01142463942d7e7cdae99869ef37da288
SHA256c5b49b4bf2ee5ffc107b5520a2bb09d619167600a921ab2bb29f4b3f17310263
SHA512c0ad9012241d4234156ca640727c9db0413746e48c045532ec35c61db64b5389c1d4ca4ee79dbba09a9780da8864372a7dea2f2ed943e715ae98420d79c5ac09
-
Filesize
63B
MD56c9d99e88d146f567bbfc6652f6955ec
SHA1431d07dcbb0ba309abc7e557f28f45549432c3fe
SHA256e460f82ea21e37a04d4e0fad3f88142fe6891a5d73d2fa29b3eb7628e60831b9
SHA512f7fb41fbb72a2d509dfe9ac4d640cccb719bdf438f48630f8bfce87d9e85c19abacaf3e59dc81657c7b5f10837054f07aa2a67dbbb8499b3e075281f331e9f7e
-
Filesize
40B
MD5f5e059efe5ed14466033f1f4357a4a4b
SHA1ccb28b2be69275c38738947e790c10a2382302c2
SHA256c7d0b4156b557c67d3e758d86a45e31c70110c989e679097f52f3edaf4963e21
SHA512d36ef9a9fe8b42951648933fdc41b9b61077bfb4221360f9308104f05e88d17ffdb07948a29858d2f4371db1def154cc4b4be57304c322934a763f6e8b8872de
-
Filesize
44KB
MD5658074f0770a6be10048e0c00d4a56af
SHA1019f6890fe89eb79d117a827ea08e5e69d0e8dac
SHA25652ee340152fd8b2aed4497ce08434c437d8b1fb455751897f192577f35545353
SHA512373d4155a1e0e3e6b14e45104a456546d5aefba63fbaa2d4a16a258831983db18ed1b7ceac3543911391a00a276f3abd5f22b304086085d7860e2f2ffebe0c7b