Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe
-
Size
1.0MB
-
MD5
aa68a521d5fcec5d24933b26162e9275
-
SHA1
8168da6d2a55050e45a6997bf49ce6511a67be59
-
SHA256
0c42facd22e0df812a49d7e64bff9fb369542cd3401b297103538f45027f92d8
-
SHA512
bb96450576086cc3cbb55cbc98e858a9e620885baedc80f2c637b2a90034104c32b2e89db60c6d4f11a0b4cd7d722fc2b4f754906f6a1e263ba5c0392a093e64
-
SSDEEP
24576:M3K+yB5tzZscm1zSnZBtn+sS4+alu1HsiFxKK:T1bzk1zsZBBSVgu1HX
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{77BE3E79-6E80-4212-8F05-80BBD9E2F270} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Shell|Desc=Windows Shell Networking|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{C3E9B20A-B7E2-4aab-9835-3C548937E46F} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Shell|Desc=Windows Shell Networking|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{B078B2B6-A878-44ff-9BCC-458257924F96} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{92459C5E-D350-4cba-AA74-C8F989C9336F} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{7ACC6E87-8C12-4adb-91B7-EFC3F2F4705A} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{B1A40E4F-58DB-490f-9D18-55B5194E8BD5} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|App=C:\\Windows\\explorer.exe|Name=Windows Explorer|" aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2520 netsh.exe -
Loads dropped DLL 6 IoCs
pid Process 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 2520 netsh.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\concrt14032.dll aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe File created C:\Windows\SysWOW64\cngaudit32.dll aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe File created C:\Windows\SysWOW64\appidapi32.dll aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe File created C:\Windows\SysWOW64\comdlg3232.dll aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe File created C:\Windows\SysWOW64\atl10032.dll aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2520 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 30 PID 1356 wrote to memory of 2520 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 30 PID 1356 wrote to memory of 2520 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 30 PID 1356 wrote to memory of 2520 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 30 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20 PID 1356 wrote to memory of 1124 1356 aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa68a521d5fcec5d24933b26162e9275JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Windows\explorer.exe" name="Windows Shell" mode=ENABLE scope=ALL profile=ALL3⤵
- Modifies Windows Firewall
- Loads dropped DLL
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5fc3f635d6865e9c788fe14d3a2cc6888
SHA1919130479ae34bfd0e276725263580e873e67eee
SHA2569649a7fc0c46980d76d144787e32f0db4fe1193632442200768f30643c5d9352
SHA512e199d9394221c60681c8c10b988713c037f076cd04262cc8b473326ca4aafac1abc2104dc393139b91ef062e9d825e21ea368aa26d5cc1bd1d530e5da52ec1ef