Analysis
-
max time kernel
123s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe
-
Size
320KB
-
MD5
d30f0ae35380dc665364cd70fa513760
-
SHA1
e80ce0e67ef73b8852df9423fbc3f658f0e27ad5
-
SHA256
cbb650609d72599b828c8ebe852de0cb8d77d2dee6babef908f825acb013dbd8
-
SHA512
1ef56f46d8630685c4bf512faa25510c0271f2f8ea4adbaed230ac3412cae03935230b616090c72a4c7fc9e504a6e6e8760fe7e2943eda8038df95dc6f1d8b2f
-
SSDEEP
3072:3l9yyAOJL+eyLhqzMmp/E9zkI4RkxHrBaWfYgaaHEl9pp4S8L+s6:3BE9zkI4RkxHrBaWfphEl9pp4S8LL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Windows\\csrss.exe," csrss.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2424 2060 csrss.exe 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\csrss.exe d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe File opened for modification C:\Windows\csrss.exe d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe File opened for modification C:\Windows\csrss.exe csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe Token: SeShutdownPrivilege 2060 csrss.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe 2060 csrss.exe 2060 csrss.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2060 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2060 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2060 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2060 2672 d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31 PID 2060 wrote to memory of 2424 2060 csrss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d30f0ae35380dc665364cd70fa513760_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\csrss.exeC:\Windows\csrss.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\System32\explorer.exe ~pers~C:\Windows\csrss.exe~3⤵PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5d30f0ae35380dc665364cd70fa513760
SHA1e80ce0e67ef73b8852df9423fbc3f658f0e27ad5
SHA256cbb650609d72599b828c8ebe852de0cb8d77d2dee6babef908f825acb013dbd8
SHA5121ef56f46d8630685c4bf512faa25510c0271f2f8ea4adbaed230ac3412cae03935230b616090c72a4c7fc9e504a6e6e8760fe7e2943eda8038df95dc6f1d8b2f