Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 22:38
Behavioral task
behavioral1
Sample
b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe
-
Size
416KB
-
MD5
b11f04b1796fe2b24a5428960e3ee26e
-
SHA1
d160c0ec90b7c02a4339da428616c65b2c5a91ba
-
SHA256
5d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251
-
SHA512
b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48
-
SSDEEP
12288:+HuaNL06AzT4OlWNDQ1YRVtWl8YKPHMWVoS:+Oa4s60AY/tWlbKPHM
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate csrss.exe -
Executes dropped EXE 2 IoCs
pid Process 2568 csrss.exe 1284 csrss.exe -
Loads dropped DLL 5 IoCs
pid Process 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000911000-memory.dmp upx behavioral1/files/0x000b0000000120d5-24.dat upx behavioral1/memory/2292-42-0x0000000000400000-0x0000000000911000-memory.dmp upx behavioral1/memory/2568-40-0x0000000000400000-0x0000000000911000-memory.dmp upx behavioral1/memory/1284-47-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-48-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2568-50-0x0000000000400000-0x0000000000911000-memory.dmp upx behavioral1/memory/1284-52-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-51-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-53-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-54-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-55-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-56-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-57-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-60-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-62-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-64-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-66-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-68-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1284-71-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString csrss.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier csrss.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1284 csrss.exe Token: SeSecurityPrivilege 1284 csrss.exe Token: SeTakeOwnershipPrivilege 1284 csrss.exe Token: SeLoadDriverPrivilege 1284 csrss.exe Token: SeSystemProfilePrivilege 1284 csrss.exe Token: SeSystemtimePrivilege 1284 csrss.exe Token: SeProfSingleProcessPrivilege 1284 csrss.exe Token: SeIncBasePriorityPrivilege 1284 csrss.exe Token: SeCreatePagefilePrivilege 1284 csrss.exe Token: SeBackupPrivilege 1284 csrss.exe Token: SeRestorePrivilege 1284 csrss.exe Token: SeShutdownPrivilege 1284 csrss.exe Token: SeDebugPrivilege 1284 csrss.exe Token: SeSystemEnvironmentPrivilege 1284 csrss.exe Token: SeChangeNotifyPrivilege 1284 csrss.exe Token: SeRemoteShutdownPrivilege 1284 csrss.exe Token: SeUndockPrivilege 1284 csrss.exe Token: SeManageVolumePrivilege 1284 csrss.exe Token: SeImpersonatePrivilege 1284 csrss.exe Token: SeCreateGlobalPrivilege 1284 csrss.exe Token: 33 1284 csrss.exe Token: 34 1284 csrss.exe Token: 35 1284 csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 2568 csrss.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1768 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 28 PID 1768 wrote to memory of 2260 1768 cmd.exe 30 PID 1768 wrote to memory of 2260 1768 cmd.exe 30 PID 1768 wrote to memory of 2260 1768 cmd.exe 30 PID 1768 wrote to memory of 2260 1768 cmd.exe 30 PID 2292 wrote to memory of 2568 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2568 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2568 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2568 2292 b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe 31 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32 PID 2568 wrote to memory of 1284 2568 csrss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Wqodj.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "csrss" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD52e20f9e88c23d1a2516870cda3aedf54
SHA1144d9248bc22e76c3e8bdeafd5ae548a8f103ff7
SHA256e7cfb8c2b4f259b2336b9e10f3090cf0373ddc35dc78aea148aefd2668d96884
SHA51268d2455d6fcc5e1d1efb9c141286b28f2f2b352f5d4e2f86c463d5c5064cdb4a64a971de1cc2cc90e6be11457d5dab527185e55715267e96eaf05928b4c80bd4
-
Filesize
416KB
MD5b11f04b1796fe2b24a5428960e3ee26e
SHA1d160c0ec90b7c02a4339da428616c65b2c5a91ba
SHA2565d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251
SHA512b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48