Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe
-
Size
85KB
-
MD5
8c37bd4a2d02381b56442be140827bf5
-
SHA1
44aa3edfa2141f4df3ae034891721da0f0e28fc3
-
SHA256
3e5e2a598e92c8183b058b6519971b74e68afab38fb15b95306a9a07e074bd2b
-
SHA512
8c40e274167c9a669a1732589554d2d04e2b7a2a6a5b60ea7fdd2b59211c92ba2080622b9e12deb1fefe80a5c2396c67dcbd7d396d18c2a2c7d972aa58e38b89
-
SSDEEP
1536:bsRzq2fhbp1pl7uMN5GFUUCJHTieoKF34he4Zh6pN50SUYSKTbsywzebTNIj4NY:zt2UCxOeoKFAbO03qCavNDNY
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\c:\users\admin\appdata\roaming\xty1ikmfgi2icqsmvjrcdel2vsymrc222\svcnost.exe = "c:\\users\\admin\\appdata\\roaming\\xty1ikmfgi2icqsmvjrcdel2vsymrc222\\svcnost.exe:*:Enabled:ldrsoft" svcnost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svcnost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svcnost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svcnost.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2740 svcnost.exe 2740 svcnost.exe -
resource yara_rule behavioral2/memory/4412-4-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4412-0-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4412-6-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4412-5-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/2740-12-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4412-14-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/2740-21-0x0000000000400000-0x0000000000462000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Init = "\"C:\\Users\\Admin\\AppData\\Roaming\\xty1ikmfgi2icqsmvjrcdel2vsymrc222\\svcnost.exe\"" 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe File opened for modification C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2688 set thread context of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 1500 set thread context of 2740 1500 svcnost.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcnost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcnost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry svcnost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\SavedLegacySettingsML = 323931363339353730 svcnost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 2688 wrote to memory of 4412 2688 8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe 91 PID 4412 wrote to memory of 1500 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe 98 PID 4412 wrote to memory of 1500 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe 98 PID 4412 wrote to memory of 1500 4412 8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe 98 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99 PID 1500 wrote to memory of 2740 1500 svcnost.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c37bd4a2d02381b56442be140827bf5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\users\admin\appdata\local\temp\8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe"c:\users\admin\appdata\local\temp\8c37bd4a2d02381b56442be140827bf5_jaffacakes118.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Roaming\xty1ikmfgi2icqsmvjrcdel2vsymrc222\svcnost.exe"C:\Users\Admin\AppData\Roaming\xty1ikmfgi2icqsmvjrcdel2vsymrc222\svcnost.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
\??\c:\users\admin\appdata\roaming\xty1ikmfgi2icqsmvjrcdel2vsymrc222\svcnost.exe"c:\users\admin\appdata\roaming\xty1ikmfgi2icqsmvjrcdel2vsymrc222\svcnost.exe"4⤵
- Modifies firewall policy service
- Loads dropped DLL
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2740
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4080,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51