Analysis
-
max time kernel
136s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe
-
Size
28KB
-
MD5
8c9acb89f44abb5641c2d86ee41bec0a
-
SHA1
ec7c8481a5566ffb57f12be8c50fc087594ec924
-
SHA256
2db1acf9d2128a9b9b48b04a707f7c40ce15ad9d309803f3e1b9e4ac0cfda790
-
SHA512
bf4b182847691434827fc8c8eaa389b50a32af491586e13333a124c3053498f23f681e585d3706ed39e3d1346c85e0a06bb2d8c7ab9f2d64fca7746894c70afa
-
SSDEEP
384:/xA2OFb3GXldJERr3P1gg/L9Risn/a60TcPnTkETDy3hZo7ZH1upGLAaUegiAjP9:WnyAn7nC63Q3bGUQsPaCB
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1104 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\wind32.exe" 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wind32.exe 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wind32.exe 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllgh8jkd1q8.exe 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dllgh8jkd1q8.exe 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5072 2296 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1104 2296 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe 85 PID 2296 wrote to memory of 1104 2296 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe 85 PID 2296 wrote to memory of 1104 2296 8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\8c9acb89f44abb5641c2d86ee41bec0a_JaffaCakes118.exe' enable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 13402⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2296 -ip 22961⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54dee1221a2ea073757f9c11be3bec19a
SHA1018c62c2f2745c6350ab594de95882aeff13a5df
SHA256ecd396df2666c7d77dde458aae72dd129dbc2d4bd25a3199f2038bc5d0dce61f
SHA512cba6411810c275a50ab1f0bc3109d2c263b3607dd75b187030233e264e5520e3992ca9571ea7d11167e119c460023477f0988900090c91e15388760766bdca31