Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe
-
Size
48KB
-
MD5
a6c23464fd33b67c2255183f0a2de9da
-
SHA1
b1329ea025274f56d86b4a907996af6bb093bf1e
-
SHA256
4bee84a86ca6c52ec64d162d455827e43a0609e89ea751447b78a7f7b2a7a170
-
SHA512
7e3fb35716db7a29ad921f4086157bdafa6877e678e569316e4a470401b28714515a1601cf9b999ddc06b77249d87dacfe49d1833a173962c4bacb84a947c4f9
-
SSDEEP
768:ye5hAwc6gzsPvkWNUzhew59jC1+J8LBVqybTst1qqruQfLfdDC5T6wfV:yeL97ZEeUzJOMJ8lxToNLFiOQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 updata.exe -
Loads dropped DLL 8 IoCs
pid Process 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KAV = "C:\\Windows\\system32\\kav.exe" updata.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\progra~1\ATI\amdk8.inf a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe File created C:\progra~1\ATI\amdk8.sys a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2100 sc.exe 2088 sc.exe 2288 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2676 2936 WerFault.exe 38 2332 2032 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updata.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeAuditPrivilege 2840 svchost.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeRestorePrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe Token: SeDebugPrivilege 2936 updata.exe Token: SeDebugPrivilege 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2100 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2088 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 33 PID 2032 wrote to memory of 2088 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 33 PID 2032 wrote to memory of 2088 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 33 PID 2032 wrote to memory of 2088 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 33 PID 2032 wrote to memory of 2288 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 35 PID 2032 wrote to memory of 2288 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 35 PID 2032 wrote to memory of 2288 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 35 PID 2032 wrote to memory of 2288 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 35 PID 2032 wrote to memory of 2936 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 38 PID 2032 wrote to memory of 2936 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 38 PID 2032 wrote to memory of 2936 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 38 PID 2032 wrote to memory of 2936 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 38 PID 2936 wrote to memory of 2676 2936 updata.exe 39 PID 2936 wrote to memory of 2676 2936 updata.exe 39 PID 2936 wrote to memory of 2676 2936 updata.exe 39 PID 2936 wrote to memory of 2676 2936 updata.exe 39 PID 2032 wrote to memory of 2332 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 40 PID 2032 wrote to memory of 2332 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 40 PID 2032 wrote to memory of 2332 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 40 PID 2032 wrote to memory of 2332 2032 a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6c23464fd33b67c2255183f0a2de9da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config PolicyAgent start= auto2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start PolicyAgent2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\updata.exe"C:\Users\Admin\AppData\Local\Temp\updata.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2323⤵
- Loads dropped DLL
- Program crash
PID:2676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6362⤵
- Program crash
PID:2332
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5219394ebb12624755e13e8c1f6da342c
SHA101c18e9c839263e3baa7f90688543a100cc407ee
SHA256153dc55887a986eb52a8be9008342a66b7b60b8ece2b5e81138309210153d142
SHA51250dffcddb5fef885388b7041789ec4c05964543d42d0777f3f7f65bcfa117513173a47488e30ace6355def928806492d7c04366343173b492b7bd8d3c148e3e7
-
Filesize
24KB
MD519dadc5a96bdb83cd324e4543a83e11f
SHA1508816148267eb2f30fd9f64258848165941d52b
SHA2561f4dc98b444b202added0600f814895222649dacb5ce8af7113ac96aee18437e
SHA5124c1f1316e1af27150025637c9a638d30fc468b1ec6823dbd495c31183f2c87eb24dae00e1b558c4ebcf0f79df36f00d2ebf450dc69d6f0ea1a5a6da2c755437c