Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe
-
Size
852KB
-
MD5
827897fc738bb1fe516cd74152f140bb
-
SHA1
2573cabeb500a4e194381557b5327706fd92dd38
-
SHA256
18909cd222e8155fb27a6b856901b2e10e0704ee59e8724424ac51b375eb8326
-
SHA512
cce6c2437b15c7973fb927819d677b33bc5bb0715e1163ec5c86a6000f71f1fbe8387e9d18f0d000f2678dd7d6cc42c74f6c76b3382481269fb6222d331ce1d6
-
SSDEEP
12288:9uEV3sUPJ0c00RDwme95mJyN2KYIosW0KaAPF9Fsv9uifapiPWQsSf7H4fiOXaUS:tjR83UrRLiC5aUrG
Malware Config
Extracted
latentbot
blackyshady.zapto.org
1blackyshady.zapto.org
2blackyshady.zapto.org
3blackyshady.zapto.org
4blackyshady.zapto.org
5blackyshady.zapto.org
6blackyshady.zapto.org
7blackyshady.zapto.org
8blackyshady.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe = "C:\\Users\\Admin\\AppData\\Roaming\\PN64PGO3HD.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe:*:Enabled:Windows Messanger" reg.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2480 set thread context of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3024 reg.exe 3028 reg.exe 2160 reg.exe 2148 reg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe Token: 1 2824 vbc.exe Token: SeCreateTokenPrivilege 2824 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2824 vbc.exe Token: SeLockMemoryPrivilege 2824 vbc.exe Token: SeIncreaseQuotaPrivilege 2824 vbc.exe Token: SeMachineAccountPrivilege 2824 vbc.exe Token: SeTcbPrivilege 2824 vbc.exe Token: SeSecurityPrivilege 2824 vbc.exe Token: SeTakeOwnershipPrivilege 2824 vbc.exe Token: SeLoadDriverPrivilege 2824 vbc.exe Token: SeSystemProfilePrivilege 2824 vbc.exe Token: SeSystemtimePrivilege 2824 vbc.exe Token: SeProfSingleProcessPrivilege 2824 vbc.exe Token: SeIncBasePriorityPrivilege 2824 vbc.exe Token: SeCreatePagefilePrivilege 2824 vbc.exe Token: SeCreatePermanentPrivilege 2824 vbc.exe Token: SeBackupPrivilege 2824 vbc.exe Token: SeRestorePrivilege 2824 vbc.exe Token: SeShutdownPrivilege 2824 vbc.exe Token: SeDebugPrivilege 2824 vbc.exe Token: SeAuditPrivilege 2824 vbc.exe Token: SeSystemEnvironmentPrivilege 2824 vbc.exe Token: SeChangeNotifyPrivilege 2824 vbc.exe Token: SeRemoteShutdownPrivilege 2824 vbc.exe Token: SeUndockPrivilege 2824 vbc.exe Token: SeSyncAgentPrivilege 2824 vbc.exe Token: SeEnableDelegationPrivilege 2824 vbc.exe Token: SeManageVolumePrivilege 2824 vbc.exe Token: SeImpersonatePrivilege 2824 vbc.exe Token: SeCreateGlobalPrivilege 2824 vbc.exe Token: 31 2824 vbc.exe Token: 32 2824 vbc.exe Token: 33 2824 vbc.exe Token: 34 2824 vbc.exe Token: 35 2824 vbc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2824 vbc.exe 2824 vbc.exe 2824 vbc.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2824 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2872 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2872 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2872 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2872 2480 827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2860 2824 vbc.exe 33 PID 2824 wrote to memory of 2860 2824 vbc.exe 33 PID 2824 wrote to memory of 2860 2824 vbc.exe 33 PID 2824 wrote to memory of 2860 2824 vbc.exe 33 PID 2824 wrote to memory of 2760 2824 vbc.exe 34 PID 2824 wrote to memory of 2760 2824 vbc.exe 34 PID 2824 wrote to memory of 2760 2824 vbc.exe 34 PID 2824 wrote to memory of 2760 2824 vbc.exe 34 PID 2824 wrote to memory of 2652 2824 vbc.exe 36 PID 2824 wrote to memory of 2652 2824 vbc.exe 36 PID 2824 wrote to memory of 2652 2824 vbc.exe 36 PID 2824 wrote to memory of 2652 2824 vbc.exe 36 PID 2824 wrote to memory of 2600 2824 vbc.exe 38 PID 2824 wrote to memory of 2600 2824 vbc.exe 38 PID 2824 wrote to memory of 2600 2824 vbc.exe 38 PID 2824 wrote to memory of 2600 2824 vbc.exe 38 PID 2760 wrote to memory of 3024 2760 cmd.exe 42 PID 2760 wrote to memory of 3024 2760 cmd.exe 42 PID 2760 wrote to memory of 3024 2760 cmd.exe 42 PID 2760 wrote to memory of 3024 2760 cmd.exe 42 PID 2860 wrote to memory of 2160 2860 cmd.exe 41 PID 2860 wrote to memory of 2160 2860 cmd.exe 41 PID 2860 wrote to memory of 2160 2860 cmd.exe 41 PID 2860 wrote to memory of 2160 2860 cmd.exe 41 PID 2652 wrote to memory of 3028 2652 cmd.exe 43 PID 2652 wrote to memory of 3028 2652 cmd.exe 43 PID 2652 wrote to memory of 3028 2652 cmd.exe 43 PID 2652 wrote to memory of 3028 2652 cmd.exe 43 PID 2600 wrote to memory of 2148 2600 cmd.exe 44 PID 2600 wrote to memory of 2148 2600 cmd.exe 44 PID 2600 wrote to memory of 2148 2600 cmd.exe 44 PID 2600 wrote to memory of 2148 2600 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\827897fc738bb1fe516cd74152f140bb_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\PN64PGO3HD.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2148
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Grand Theft Auto IV.bat""2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD5827897fc738bb1fe516cd74152f140bb
SHA12573cabeb500a4e194381557b5327706fd92dd38
SHA25618909cd222e8155fb27a6b856901b2e10e0704ee59e8724424ac51b375eb8326
SHA512cce6c2437b15c7973fb927819d677b33bc5bb0715e1163ec5c86a6000f71f1fbe8387e9d18f0d000f2678dd7d6cc42c74f6c76b3382481269fb6222d331ce1d6
-
Filesize
218B
MD5642db6bd8fcc59a15323342dd1989b6c
SHA1fc6cafbee7f65c5ab1db009b6294651cf0e9580f
SHA25654a870d394683824151806b528c9116e01864c4c74516b90a69eb61190d7c400
SHA51296feb7a0dfbdf24daa6fea7879718547c1888ccfc4b40383150e9233134436fc59f7131639648cfbaae814a4e769385b7334a0aa23ef9e44a32871383805b68a