Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe
-
Size
684KB
-
MD5
6f9bd9d855fe272924a9cff391eef74b
-
SHA1
907664fb66ad3fd7f122fd1a5ede879f60a9abde
-
SHA256
77666db52fa31340f6cfab997e70f8e131d9abf194492eb835abbddf7386992f
-
SHA512
30eeb42bd8cb6a703607e760a0bd9510e35841f8fccf568f080dcffcb66402796dcd85ef72fb6910922efa9c7d3f6d4300ce5e9fccec39d9edc10af583a11465
-
SSDEEP
6144:N9zgUC2RpgkVIzKKs8E72TFvAt9oGNCi5HzPh6iCGcATwRVqep0BS9ARjh/gw3FX:852VlKTEEqIsq7745Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2936 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2768 csrss.exe 1728 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2360 set thread context of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2768 set thread context of 1728 2768 csrss.exe 36 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 2768 csrss.exe 1728 csrss.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2552 2360 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2936 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2936 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2936 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2936 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2768 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 35 PID 2552 wrote to memory of 2768 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 35 PID 2552 wrote to memory of 2768 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 35 PID 2552 wrote to memory of 2768 2552 6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe 35 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36 PID 2768 wrote to memory of 1728 2768 csrss.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe/d C:\Users\Admin\AppData\Local\Temp\6f9bd9d855fe272924a9cff391eef74b_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD5a66b99b66d797c87f0ef889f995f12c9
SHA1387e9d0ef9be968d82327bc4aa059809451c735b
SHA25614040a248b57decd8bb728286e68582421d54b9949f145c54594cd9c210ec433
SHA51205709cf63f77dd8db97af3bd85495d4bd88279987a1cbd0071057dfde1cff77fc15a5b07ae8a8ccf947f425a4608d255366efe7b521f5c91c537aa2bd9ca4907