Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 21:24
Behavioral task
behavioral1
Sample
c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe
-
Size
223KB
-
MD5
c7ad51732aa729f32695bd0f40ae15de
-
SHA1
c470728b425f69c19bf862f22d890ff72dd6ed3b
-
SHA256
4e2acffae00d151d91fdcca93487fd7408c5f4ab92eceabe46b8490c2a92ec82
-
SHA512
00bd2c0a9ef6ad307f9f4bbab47507fdf41049b5f08a8eb02b4b2ebdf14881031898a94d2addc9177d63755fa86242f98b006657cfa3275a2b3ffe74db57787a
-
SSDEEP
6144:DPqo97zVRqsZnoaZP+MS9dCOPr1ZVZWoqkqX8gmefozdAxY:DP99NRqOoaZ2H3dPpZHZqX8KAmxY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ISFQSKDEUH = "C:\\Windows\\SysWOW64\\serwvdrv5.exe" c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts serwvdrv5.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation serwvdrv5.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 serwvdrv5.exe -
resource yara_rule behavioral2/memory/776-0-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/776-5-0x0000000000520000-0x00000000005B1000-memory.dmp upx behavioral2/memory/776-7-0x0000000000520000-0x00000000005B1000-memory.dmp upx behavioral2/memory/776-2-0x0000000000520000-0x00000000005B1000-memory.dmp upx behavioral2/memory/776-6-0x0000000000520000-0x00000000005B1000-memory.dmp upx behavioral2/memory/776-29-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/776-30-0x0000000000520000-0x00000000005B1000-memory.dmp upx behavioral2/memory/776-38-0x0000000000520000-0x00000000005B1000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\serwvdrv5.exe c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\serwvdrv5.exe c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language serwvdrv5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3660 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4652 serwvdrv5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 776 wrote to memory of 4652 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 85 PID 776 wrote to memory of 4652 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 85 PID 776 wrote to memory of 4652 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 85 PID 776 wrote to memory of 3608 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 87 PID 776 wrote to memory of 3608 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 87 PID 776 wrote to memory of 3608 776 c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe 87 PID 4652 wrote to memory of 3660 4652 serwvdrv5.exe 89 PID 4652 wrote to memory of 3660 4652 serwvdrv5.exe 89 PID 4652 wrote to memory of 3660 4652 serwvdrv5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\serwvdrv5.exeC:\Windows\SysWOW64\serwvdrv5.exe2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3660
-
-
-
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins2531.bat "C:\Users\Admin\AppData\Local\Temp\c7ad51732aa729f32695bd0f40ae15de_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42
-
Filesize
2KB
MD5a48249517f2f7a1b7e87e31b58d676d2
SHA1e7e21a080b40af4df354e6dd2f5451b06870caf0
SHA25618cf01cdfe2084e965e0358192de6b8fb2abdeee6ec47f00e772642e97bc5326
SHA512fc4933d4a84671877e5c61a4b5232e6e1bb9faecb0e45bfb145f9d73be81b9047cf79ebaaaa74b95439b9559688f16f487ff1dc4cc4ba9711f3aea8357d30c73
-
Filesize
78KB
MD5eedf4046db6ab0fc47e10abaea01274e
SHA1fd7981c6105a04f1e59bf2a01373e383173d6851
SHA256a5e144aa4efad7e858be4ec63843ff99f074f161a91ab6d65643b052cbd7427e
SHA512d29480585903f0c7fe25f9a06e9cdd3de59ab3bdaa529aa08d666d8bc5ce33c78ec72d3ea74c350f0fbb4a49d9b60732efac0a5c928be963b4ca79153111477e