Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe
-
Size
410KB
-
MD5
d42a883daf41c76e92d3cc68779dfda5
-
SHA1
d326b3d9515e23e26f5c9432b27eb64e08a1184c
-
SHA256
f41661bbdf9c591942b0e470938cf56b9787099be0df57286ee983d56b0135d4
-
SHA512
69013b0a11a79c22e1b8655e347170239f6f7f01c5edc5c4af5405f513d8d3f0e0642ea18076303d7f8091253b1fb5859d3a26e1dc3d9515e5f5f5867030bb33
-
SSDEEP
12288:F2yy6toS493ACIl7vI1kiqHNnyVek/a4QmHNX467p0suc:F2yZoIjIbgyLC495467gc
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msconfig.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications msconfig.exe -
Executes dropped EXE 2 IoCs
pid Process 4872 msconfig.exe 4976 msconfig.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 4872 msconfig.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3504 set thread context of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 4872 set thread context of 4976 4872 msconfig.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4028 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 4028 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe 4976 msconfig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 4872 msconfig.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3504 wrote to memory of 1420 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 85 PID 3504 wrote to memory of 1420 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 85 PID 3504 wrote to memory of 1420 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 85 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 3504 wrote to memory of 4028 3504 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 87 PID 4028 wrote to memory of 4872 4028 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 89 PID 4028 wrote to memory of 4872 4028 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 89 PID 4028 wrote to memory of 4872 4028 d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe 89 PID 4872 wrote to memory of 2088 4872 msconfig.exe 90 PID 4872 wrote to memory of 2088 4872 msconfig.exe 90 PID 4872 wrote to memory of 2088 4872 msconfig.exe 90 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92 PID 4872 wrote to memory of 4976 4872 msconfig.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\RoamingFirewall.bat2⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d42a883daf41c76e92d3cc68779dfda5_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\RoamingFirewall.bat4⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Roaming\msconfig.exeC:\Users\Admin\AppData\Roaming\msconfig.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5ad8f534ea726ddec58a390dee334362f
SHA1847339c3a250e6910602a8570156ac4559ef90c0
SHA2568a469c68715e6cda6c891a6c372b1560e17b9f8756e97f321a9d966986f960da
SHA5126eca7a37fedbd0c6ccc5e0ccec9e48641cd7d4bd6d2a1979dc0fb8b6950c264db48291f68b8cc50c987b98f551304e114c1ca916b1f88144e8fa6d50cf939a92
-
Filesize
410KB
MD5d42a883daf41c76e92d3cc68779dfda5
SHA1d326b3d9515e23e26f5c9432b27eb64e08a1184c
SHA256f41661bbdf9c591942b0e470938cf56b9787099be0df57286ee983d56b0135d4
SHA51269013b0a11a79c22e1b8655e347170239f6f7f01c5edc5c4af5405f513d8d3f0e0642ea18076303d7f8091253b1fb5859d3a26e1dc3d9515e5f5f5867030bb33