Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe
-
Size
191KB
-
MD5
c1f0742a5b6b182b14f22148e9f7198a
-
SHA1
1d9043f492680b8bf826a0c04c79592c31e63595
-
SHA256
3c597cb9b665cceae1c13472efa52447048fd7d81a55d42cf862c3d049cdad8b
-
SHA512
e5a6260d63997b2da857c4d1d881b8f129cf1986c56532f1a99b6a1e9b5cec4a48d63ec4ab9742a044b19ac393916428b06f6c73f4df8f804406f837baa28fca
-
SSDEEP
3072:5QE0PEAkN2SlX2YfQCUw2WsXRhLG7OJBeJNwm3k7MNTwAGmXJxEZA2wTH08me:EHcFI/wzYo7sWwmwawVmXJxEZTqU8me
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" file1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2216 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2208 file1.exe 2452 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 file1.exe 2208 file1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" file1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" file1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 file1.exe 2452 lsass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2208 2456 c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe 30 PID 2456 wrote to memory of 2208 2456 c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe 30 PID 2456 wrote to memory of 2208 2456 c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe 30 PID 2456 wrote to memory of 2208 2456 c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2216 2208 file1.exe 31 PID 2208 wrote to memory of 2216 2208 file1.exe 31 PID 2208 wrote to memory of 2216 2208 file1.exe 31 PID 2208 wrote to memory of 2216 2208 file1.exe 31 PID 2208 wrote to memory of 2452 2208 file1.exe 33 PID 2208 wrote to memory of 2452 2208 file1.exe 33 PID 2208 wrote to memory of 2452 2208 file1.exe 33 PID 2208 wrote to memory of 2452 2208 file1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1f0742a5b6b182b14f22148e9f7198a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\lsass.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\file1.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD57427959882a791f3a8fbd2d608707faa
SHA1b2020afcf0c14f59017c4c6cb95f39f3a0110339
SHA2568715e40b24acdc46b5955926c5cec273d0273730aa8c8dc07b3878d693d277b2
SHA5129ccc84929487deb40b6dfff8cb232a45cfd838bc2e4d3c856abeb7af7a5b964ec82a7e09d307a0e9365babf1ef930e411f244786bc962b809d0f93c55363abd1
-
Filesize
108KB
MD5b51f0a0d26ac176c0a115994a81cae1e
SHA19d9585b9131d10151df71716002f64ed848702e0
SHA256bd496f99ab1063efb0e5e29614189ab8b8b75f2a621a8b642c761fbffe934f01
SHA512d81a8860a4c3bd296f4a856a381f7cfd659cff89c4d286abaac755cf7227f6b278967c964471e5892fcc8ed8e87c5ff7040d933f99986679edccb2b7beaa6d22