Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 20:00
Behavioral task
behavioral1
Sample
d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe
-
Size
410KB
-
MD5
d701759122bb3dfb8c0335e9398ad6c0
-
SHA1
16fdc67a4a8d6c84f41b4921c1d41a92adaf4894
-
SHA256
d30a1f969c46054f3a0b1bf99b4fd4abb37b401755931b4dcb35c1d8d1cf7e98
-
SHA512
31bfc5c04a0c357652d03405be481ed19feef04dea0410593e7b5ceda75fd580369be2c96f4786e15182f39730464dc6a7a553e5f65814e1219a4693e878d781
-
SSDEEP
12288:SnNhuBoY8SorxgmA+nlvVlyMLl/hdID9QFR4U:SPatCg7EP8MxJdGU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1432 csrcs.exe -
resource yara_rule behavioral2/memory/5084-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0003000000022a85-13.dat upx behavioral2/memory/1432-82-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/5084-86-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1432-82-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe behavioral2/memory/5084-86-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4292 PING.EXE 3504 PING.EXE 3052 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3504 PING.EXE 3052 PING.EXE 4292 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 1432 csrcs.exe 1432 csrcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1432 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 86 PID 5084 wrote to memory of 1432 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 86 PID 5084 wrote to memory of 1432 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 86 PID 1432 wrote to memory of 4836 1432 csrcs.exe 88 PID 1432 wrote to memory of 4836 1432 csrcs.exe 88 PID 1432 wrote to memory of 4836 1432 csrcs.exe 88 PID 4836 wrote to memory of 3504 4836 cmd.exe 90 PID 4836 wrote to memory of 3504 4836 cmd.exe 90 PID 4836 wrote to memory of 3504 4836 cmd.exe 90 PID 5084 wrote to memory of 3600 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 91 PID 5084 wrote to memory of 3600 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 91 PID 5084 wrote to memory of 3600 5084 d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe 91 PID 3600 wrote to memory of 3052 3600 cmd.exe 93 PID 3600 wrote to memory of 3052 3600 cmd.exe 93 PID 3600 wrote to memory of 3052 3600 cmd.exe 93 PID 4836 wrote to memory of 4292 4836 cmd.exe 98 PID 4836 wrote to memory of 4292 4836 cmd.exe 98 PID 4836 wrote to memory of 4292 4836 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d701759122bb3dfb8c0335e9398ad6c0_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3504
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD51bf72d0ccacc1d255a81fb818ec81362
SHA1d955fb43503ea99c48c25455e39d4ff42f2296d2
SHA256bd6413e3964d191cdf0e0abf7b02ee565e732ab8e2b53fca6c44790562de6c7b
SHA512ef2e985193293725198eb3fc3f73743d435f4b67db2741edc0eccb555fe96bbdd33fcacd2eb8cc2ea35ebfd7d7bcb6be4b616f421a60c534602a250e75ddd55a
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD5fd54ca55bdcf7d9ae2259d47e294da03
SHA1e42c53623bc6004f2a1dd5f611dc40a12279a9e5
SHA256ea6e5f9779026dcddae2ae30bc9334baf81a6a03e3a6f89938918e37d4ec3122
SHA51248cdf15a9bcb4b952551f619a39ddb6596ed0e53d8e3ec1daa29545b3a979faf7d5ce1f4f4c5b01baf6e660b8bb5db48e5143798ca7e19b8c4fd2ab2f47cc0ad
-
Filesize
410KB
MD5d701759122bb3dfb8c0335e9398ad6c0
SHA116fdc67a4a8d6c84f41b4921c1d41a92adaf4894
SHA256d30a1f969c46054f3a0b1bf99b4fd4abb37b401755931b4dcb35c1d8d1cf7e98
SHA51231bfc5c04a0c357652d03405be481ed19feef04dea0410593e7b5ceda75fd580369be2c96f4786e15182f39730464dc6a7a553e5f65814e1219a4693e878d781