Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe
-
Size
300KB
-
MD5
a106ee87b9330b0617b5774e45918467
-
SHA1
d0945b80f0b877a878655f4b6b23c972e833a696
-
SHA256
b72fde69482285756c3ceebe742a07c1f90a26098be86a5bd5e8d092bd99f465
-
SHA512
46540d65263b16807eadc476b2b5015fb59528bf19f3bbe2677e5be6263d7cba14c11811283e971f484e84e83d52ce36caac2afd2b759912c14a1a9c68e65fb8
-
SSDEEP
6144:L4KUbifAhYpDRTZeBUO+iXqEwl1YhpvihcZQWN:LdDRZeWAq/l1Yh9y0QWN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3016 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2128 csrss.exe 512 csrss.exe 2780 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrss.exe" a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 csrss.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3732 set thread context of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3916 set thread context of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 2128 set thread context of 512 2128 csrss.exe 97 PID 512 set thread context of 2780 512 csrss.exe 98 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 3016 netsh.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 2128 csrss.exe 512 csrss.exe 2780 csrss.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3732 wrote to memory of 3916 3732 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 90 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 3916 wrote to memory of 64 3916 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 91 PID 64 wrote to memory of 3016 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 92 PID 64 wrote to memory of 3016 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 92 PID 64 wrote to memory of 3016 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 92 PID 64 wrote to memory of 2128 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 95 PID 64 wrote to memory of 2128 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 95 PID 64 wrote to memory of 2128 64 a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe 95 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 2128 wrote to memory of 512 2128 csrss.exe 97 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98 PID 512 wrote to memory of 2780 512 csrss.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Nero" dir=in action=allow description="Multimedia suite" program="C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrss.exeC:\Users\Admin\AppData\Local\Temp\a106ee87b9330b0617b5774e45918467_JaffaCakes118.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5a106ee87b9330b0617b5774e45918467
SHA1d0945b80f0b877a878655f4b6b23c972e833a696
SHA256b72fde69482285756c3ceebe742a07c1f90a26098be86a5bd5e8d092bd99f465
SHA51246540d65263b16807eadc476b2b5015fb59528bf19f3bbe2677e5be6263d7cba14c11811283e971f484e84e83d52ce36caac2afd2b759912c14a1a9c68e65fb8