Analysis
-
max time kernel
4s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 00:40
Behavioral task
behavioral1
Sample
8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe
-
Size
913KB
-
MD5
8852b7e7445dc84329714a34e95aa2dd
-
SHA1
2d9ddc95c2ea0514eadebd4eeb9a5e6f55fabb21
-
SHA256
eb461db439d16a2ae7cfa01ed20c51d77d8940b26c953a1507bad1c7b5759e5d
-
SHA512
54d230bd1cc951ca6725d421993c84cf51043a9b5f3634be1222727ebfcfc5b3ad85eb9c5aa0f6baffe121ce2a2d6f1cede932e7f86490e7afe9546552321a1e
-
SSDEEP
24576:LFE//Tct4bOsMJpCCXHHqhNQOsxlwS8kbQqITdVGk:hSVMJdH0VCXr0qzk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" SyStEm.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1644 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation SyStEm.exe -
Executes dropped EXE 2 IoCs
pid Process 2192 SyStEm.exe 4924 msdcsc.exe -
resource yara_rule behavioral2/memory/3304-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3304-90-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3304-94-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" SyStEm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\n: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\u: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\y: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\z: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\b: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\k: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\q: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\s: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\t: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\x: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\h: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\i: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\m: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\r: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\w: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\v: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\a: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\g: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\j: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\l: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\o: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened (read-only) \??\p: 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3304-90-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3304-94-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\JY.exe 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File created C:\Windows\InJeCtoR.exe 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened for modification C:\Windows\InJeCtoR.exe 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File created C:\Windows\J_Y.rar 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File opened for modification C:\Windows\J_Y.rar 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe File created C:\Windows\JY.exe 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SyStEm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4952 cmd.exe 2756 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ SyStEm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2756 PING.EXE -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2192 SyStEm.exe Token: SeSecurityPrivilege 2192 SyStEm.exe Token: SeTakeOwnershipPrivilege 2192 SyStEm.exe Token: SeLoadDriverPrivilege 2192 SyStEm.exe Token: SeSystemProfilePrivilege 2192 SyStEm.exe Token: SeSystemtimePrivilege 2192 SyStEm.exe Token: SeProfSingleProcessPrivilege 2192 SyStEm.exe Token: SeIncBasePriorityPrivilege 2192 SyStEm.exe Token: SeCreatePagefilePrivilege 2192 SyStEm.exe Token: SeBackupPrivilege 2192 SyStEm.exe Token: SeRestorePrivilege 2192 SyStEm.exe Token: SeShutdownPrivilege 2192 SyStEm.exe Token: SeDebugPrivilege 2192 SyStEm.exe Token: SeSystemEnvironmentPrivilege 2192 SyStEm.exe Token: SeChangeNotifyPrivilege 2192 SyStEm.exe Token: SeRemoteShutdownPrivilege 2192 SyStEm.exe Token: SeUndockPrivilege 2192 SyStEm.exe Token: SeManageVolumePrivilege 2192 SyStEm.exe Token: SeImpersonatePrivilege 2192 SyStEm.exe Token: SeCreateGlobalPrivilege 2192 SyStEm.exe Token: 33 2192 SyStEm.exe Token: 34 2192 SyStEm.exe Token: 35 2192 SyStEm.exe Token: 36 2192 SyStEm.exe Token: SeIncreaseQuotaPrivilege 4924 msdcsc.exe Token: SeSecurityPrivilege 4924 msdcsc.exe Token: SeTakeOwnershipPrivilege 4924 msdcsc.exe Token: SeLoadDriverPrivilege 4924 msdcsc.exe Token: SeSystemProfilePrivilege 4924 msdcsc.exe Token: SeSystemtimePrivilege 4924 msdcsc.exe Token: SeProfSingleProcessPrivilege 4924 msdcsc.exe Token: SeIncBasePriorityPrivilege 4924 msdcsc.exe Token: SeCreatePagefilePrivilege 4924 msdcsc.exe Token: SeBackupPrivilege 4924 msdcsc.exe Token: SeRestorePrivilege 4924 msdcsc.exe Token: SeShutdownPrivilege 4924 msdcsc.exe Token: SeDebugPrivilege 4924 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4924 msdcsc.exe Token: SeChangeNotifyPrivilege 4924 msdcsc.exe Token: SeRemoteShutdownPrivilege 4924 msdcsc.exe Token: SeUndockPrivilege 4924 msdcsc.exe Token: SeManageVolumePrivilege 4924 msdcsc.exe Token: SeImpersonatePrivilege 4924 msdcsc.exe Token: SeCreateGlobalPrivilege 4924 msdcsc.exe Token: 33 4924 msdcsc.exe Token: 34 4924 msdcsc.exe Token: 35 4924 msdcsc.exe Token: 36 4924 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4924 msdcsc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3304 wrote to memory of 2192 3304 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe 85 PID 3304 wrote to memory of 2192 3304 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe 85 PID 3304 wrote to memory of 2192 3304 8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe 85 PID 2192 wrote to memory of 2084 2192 SyStEm.exe 86 PID 2192 wrote to memory of 2084 2192 SyStEm.exe 86 PID 2192 wrote to memory of 2084 2192 SyStEm.exe 86 PID 2192 wrote to memory of 4952 2192 SyStEm.exe 88 PID 2192 wrote to memory of 4952 2192 SyStEm.exe 88 PID 2192 wrote to memory of 4952 2192 SyStEm.exe 88 PID 2084 wrote to memory of 1644 2084 cmd.exe 90 PID 2084 wrote to memory of 1644 2084 cmd.exe 90 PID 2084 wrote to memory of 1644 2084 cmd.exe 90 PID 4952 wrote to memory of 2756 4952 cmd.exe 91 PID 4952 wrote to memory of 2756 4952 cmd.exe 91 PID 4952 wrote to memory of 2756 4952 cmd.exe 91 PID 2192 wrote to memory of 4924 2192 SyStEm.exe 92 PID 2192 wrote to memory of 4924 2192 SyStEm.exe 92 PID 2192 wrote to memory of 4924 2192 SyStEm.exe 92 PID 4924 wrote to memory of 3588 4924 msdcsc.exe 93 PID 4924 wrote to memory of 3588 4924 msdcsc.exe 93 PID 4924 wrote to memory of 3588 4924 msdcsc.exe 93 PID 4924 wrote to memory of 3680 4924 msdcsc.exe 94 PID 4924 wrote to memory of 3680 4924 msdcsc.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1644 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8852b7e7445dc84329714a34e95aa2dd_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\SyStEm.exeC:\Users\Admin\AppData\Local\Temp\SyStEm.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\SyStEm.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 44⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2756
-
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:3588
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:3680
-
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4036
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD52f12b6d556c951e00a177b2615a4aac1
SHA186763c31777995f2fecc94cf3bbf7c8ceefc3853
SHA2566b7d07b890ed7a293c67f005902242ba4ad9b68a768aa41a01487834022b5a82
SHA512d939d2e69830d3404e8413b68a31bab1561b3e8684b59774b3e363b2a522a27c3cb88d941520160a69481444d010d84dc50149fe24a701bd4899a6f63212ec0f