Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
cf561040aabd774294335baec2e9ea00
-
SHA1
356cdf6eb0e727cda63547bc110d2f3a2a7fae0f
-
SHA256
3e7f821b5386fc8b6983811a9c9e969ddb15b567969f203fda5617553575fe00
-
SHA512
483f0f1c3a8d981a443a31e287d7596d6ec9fef44641dc9c9c887b1d6d29cb05a7620f6b5cad36180bb64ed6f5e3cab22a32e912c9b136569e700031874e2e57
-
SSDEEP
49152:yiqXjFPE6KQaqz5HgrqhPLKqXZj8wTbDyhsotbgJSg79g3Ze7:yzzFM7q1Hg2hP2ofo
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2460 svchost_ms.exe 2804 svchost_ms.exe -
Loads dropped DLL 1 IoCs
pid Process 2304 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost_ms.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\SmartData\svchost_ms.exe cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\SmartData\svchost_ms.exe cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe File created C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe File opened for modification C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost_ms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost_ms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost_ms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost_ms.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe 2804 svchost_ms.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2804 svchost_ms.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2304 1972 cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2304 1972 cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2304 1972 cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2304 1972 cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe 30 PID 2304 wrote to memory of 868 2304 cmd.exe 32 PID 2304 wrote to memory of 868 2304 cmd.exe 32 PID 2304 wrote to memory of 868 2304 cmd.exe 32 PID 2304 wrote to memory of 868 2304 cmd.exe 32 PID 2304 wrote to memory of 2460 2304 cmd.exe 33 PID 2304 wrote to memory of 2460 2304 cmd.exe 33 PID 2304 wrote to memory of 2460 2304 cmd.exe 33 PID 2304 wrote to memory of 2460 2304 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf561040aabd774294335baec2e9ea00_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /S /C choice /C Y /N /D Y /T 3 & "C:\Program Files (x86)\SmartData\svchost_ms.exe" /start2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /start3⤵
- Executes dropped EXE
PID:2460
-
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /srv1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5cf561040aabd774294335baec2e9ea00
SHA1356cdf6eb0e727cda63547bc110d2f3a2a7fae0f
SHA2563e7f821b5386fc8b6983811a9c9e969ddb15b567969f203fda5617553575fe00
SHA512483f0f1c3a8d981a443a31e287d7596d6ec9fef44641dc9c9c887b1d6d29cb05a7620f6b5cad36180bb64ed6f5e3cab22a32e912c9b136569e700031874e2e57