Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe
-
Size
702KB
-
MD5
c83e2a419b36410f3d907c52fbffe6fb
-
SHA1
44209ef2c21fd51e0770aab6da3ccba11f8ce7ca
-
SHA256
b64e52fbd392cc861b0246318ee4556ef9c8b43cd6c4a3f2384f844ababf59c1
-
SHA512
c0034a2da49b38e83b11519b69c0b62c7e3453c788945b843f37ecde329c16a16fa11f4275d96fcbd1615827b14183b62ebc23468549191c6636b721a634597c
-
SSDEEP
12288:U6SKqT31T6WpJY6V765jKqostkm3NbHsPUuZacEJ:FxqT31T6WE6I5jKqosOm9bHNiEJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 csrcs.exe -
Loads dropped DLL 6 IoCs
pid Process 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 1420 csrcs.exe 1420 csrcs.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2476-0-0x0000000000400000-0x0000000000498000-memory.dmp autoit_exe behavioral1/files/0x000b000000012283-13.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2716 PING.EXE 1908 PING.EXE 680 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2716 PING.EXE 1908 PING.EXE 680 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 1420 csrcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1420 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 30 PID 2476 wrote to memory of 1420 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 30 PID 2476 wrote to memory of 1420 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 30 PID 2476 wrote to memory of 1420 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 30 PID 1420 wrote to memory of 2828 1420 csrcs.exe 31 PID 1420 wrote to memory of 2828 1420 csrcs.exe 31 PID 1420 wrote to memory of 2828 1420 csrcs.exe 31 PID 1420 wrote to memory of 2828 1420 csrcs.exe 31 PID 2828 wrote to memory of 2716 2828 cmd.exe 33 PID 2828 wrote to memory of 2716 2828 cmd.exe 33 PID 2828 wrote to memory of 2716 2828 cmd.exe 33 PID 2828 wrote to memory of 2716 2828 cmd.exe 33 PID 2476 wrote to memory of 2768 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 34 PID 2476 wrote to memory of 2768 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 34 PID 2476 wrote to memory of 2768 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 34 PID 2476 wrote to memory of 2768 2476 c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe 34 PID 2768 wrote to memory of 1908 2768 cmd.exe 36 PID 2768 wrote to memory of 1908 2768 cmd.exe 36 PID 2768 wrote to memory of 1908 2768 cmd.exe 36 PID 2768 wrote to memory of 1908 2768 cmd.exe 36 PID 2828 wrote to memory of 680 2828 cmd.exe 38 PID 2828 wrote to memory of 680 2828 cmd.exe 38 PID 2828 wrote to memory of 680 2828 cmd.exe 38 PID 2828 wrote to memory of 680 2828 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c83e2a419b36410f3d907c52fbffe6fb_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2716
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:680
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD590ee7705add6d9c01728f68facf0d6be
SHA1838c317d1d680cdd5e597a0f106dd21b094b58e7
SHA25616978aa7e7c3877837ee1980732a2dbf6886b82510b622118aeff26ea0a99ca6
SHA5127643b872bd2a91af813581bbbf67d639a555ba9262d8d77e6ab7df1b1352b72b2d0ec1d9b9963b8557bf99a191b3bca6f8328528d4bc325e9c2f39e8c301d5b0
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD574947b59264e6a80a15f19ad389bfbb3
SHA10f9e0b0291b3ce0d9e512fc90db1853d72be043a
SHA25691f6929a33af923ed781f5f8a331c88d7059ef4f1be5f83e12dc20558d91fe1e
SHA512e1392796562d772dff89358b18e056a5085259591012b25e3275906d5cd1140a675ceda8c960976655cde9615a603d28c07adc0064a544df31ddd3acf4601106
-
Filesize
702KB
MD5c83e2a419b36410f3d907c52fbffe6fb
SHA144209ef2c21fd51e0770aab6da3ccba11f8ce7ca
SHA256b64e52fbd392cc861b0246318ee4556ef9c8b43cd6c4a3f2384f844ababf59c1
SHA512c0034a2da49b38e83b11519b69c0b62c7e3453c788945b843f37ecde329c16a16fa11f4275d96fcbd1615827b14183b62ebc23468549191c6636b721a634597c