Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe
-
Size
764KB
-
MD5
710c4174e50f8f983c87c11a6b0d98bd
-
SHA1
cb41313bf0d4c6a8333165522d0fb197f9a913ba
-
SHA256
c126878ed92b76bba1a472ed31665c6825a4359f478b69981409a785da15d07c
-
SHA512
32156b679f84d088f06cca6e8ac285599c4dd744c4a04573d1994af11c8b5498f117541317317104cb3338b5fed9647305f29e4b8bfb8fd5c84b392d35ac1c36
-
SSDEEP
12288:pOVC0kxf99BYwgkf1Y6ai6yWgXZ9Rlmy6qwEh1B4isFCK3x4QHpZGd8d87:sCpR99SwBYa6YHl6LrtFCgCQud8dM
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\systems.exe = "C:\\Users\\Admin\\AppData\\Roaming\\systems.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 JB7DCAE1.exe -
resource yara_rule behavioral2/files/0x00090000000234b1-8.dat upx behavioral2/memory/2772-87-0x0000000000400000-0x0000000000836000-memory.dmp upx behavioral2/memory/2772-94-0x0000000000400000-0x0000000000836000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3892 set thread context of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JB7DCAE1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2756 reg.exe 1968 reg.exe 1820 reg.exe 2420 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeCreateTokenPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeLockMemoryPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeMachineAccountPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeTcbPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeSecurityPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeSystemtimePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeBackupPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeRestorePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeShutdownPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeDebugPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeAuditPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeUndockPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeSyncAgentPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeEnableDelegationPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeManageVolumePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeImpersonatePrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: 31 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: 32 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: 33 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: 34 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: 35 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe Token: SeDebugPrivilege 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3892 wrote to memory of 3756 3892 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 87 PID 3756 wrote to memory of 2772 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 88 PID 3756 wrote to memory of 2772 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 88 PID 3756 wrote to memory of 2772 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 88 PID 3756 wrote to memory of 3016 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 89 PID 3756 wrote to memory of 3016 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 89 PID 3756 wrote to memory of 3016 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 89 PID 3756 wrote to memory of 4156 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 90 PID 3756 wrote to memory of 4156 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 90 PID 3756 wrote to memory of 4156 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 90 PID 3756 wrote to memory of 3476 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 91 PID 3756 wrote to memory of 3476 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 91 PID 3756 wrote to memory of 3476 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 91 PID 3756 wrote to memory of 4080 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 92 PID 3756 wrote to memory of 4080 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 92 PID 3756 wrote to memory of 4080 3756 710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe 92 PID 3016 wrote to memory of 2756 3016 cmd.exe 97 PID 3016 wrote to memory of 2756 3016 cmd.exe 97 PID 3016 wrote to memory of 2756 3016 cmd.exe 97 PID 3476 wrote to memory of 1820 3476 cmd.exe 99 PID 3476 wrote to memory of 1820 3476 cmd.exe 99 PID 3476 wrote to memory of 1820 3476 cmd.exe 99 PID 4080 wrote to memory of 1968 4080 cmd.exe 98 PID 4080 wrote to memory of 1968 4080 cmd.exe 98 PID 4080 wrote to memory of 1968 4080 cmd.exe 98 PID 4156 wrote to memory of 2420 4156 cmd.exe 100 PID 4156 wrote to memory of 2420 4156 cmd.exe 100 PID 4156 wrote to memory of 2420 4156 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\JB7DCAE1.exeC:\Users\Admin\AppData\Local\Temp\JB7DCAE1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\710c4174e50f8f983c87c11a6b0d98bd_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\systems.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\systems.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\systems.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\systems.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD591e958f88331094ceb1b5ef1b3d88912
SHA1e4ba253033f5d3065646c0a042e3f2cb26f8dc19
SHA256b5ff54a50a2fa8ec788d2586a0387908743bfb913ba65265ee06176252bce1b1
SHA512c54fb92a627c54ebf606af464ca564a9e5e1f2762ef5f480d3f0ce315c8c5b2b25afc2c9cf3467d731499c9b8879f5d6149d563d9a0ab9723c21b6faf33a4f66
-
Filesize
240KB
MD57120aabfa4282effabda10341456e4e1
SHA1bff462f12458402494bb639f882c3411d9a3e6d4
SHA256c1715b591ed08adae649bc97a06dc74acc2d99091f46657981ab33755dc95b25
SHA512601d578b7096b6276fe724729b8edfc26752f5c5862941a63c85f064f5cc1ae16941d7d9814e117b4ed6d728d91c874d25647655412ae18bbec20b306b3d8015