Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 14:06
Behavioral task
behavioral1
Sample
dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe
-
Size
34KB
-
MD5
dc61d58b65dbed835226b3047d9e9627
-
SHA1
96a4ea8b2da428338c562d740c3749215d61914c
-
SHA256
dd552663ded841be53ab2a2e5f55a158909558c96685163887d51008cfa5ead7
-
SHA512
ed0e614d875c83ecd68df26ee9b22c22d4b539bbdd3c58b733a67598d370e517754374658532862ceddfdf17485ce866898a635469fefb0d52f97b8415831464
-
SSDEEP
768:sPTVngLKKX7loN9l4j9i/702Z76Hns0k1OCx00nT1n:sPp8le9KgTR8nsFEK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\connin.exe" dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation shchost.exe -
Deletes itself 1 IoCs
pid Process 1132 shchost.exe -
Executes dropped EXE 3 IoCs
pid Process 4840 csrsse.exe 1132 shchost.exe 1792 connin.exe -
resource yara_rule behavioral2/memory/3332-0-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3332-2-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3332-28-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/files/0x00070000000235fa-35.dat upx behavioral2/memory/1792-45-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\discard.ini dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe File created C:\Windows\SysWOW64\Fsevisy.sys dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe File created C:\Windows\SysWOW64\ssdtti.sys dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe File created C:\Windows\SysWOW64\shchost.exe dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe File created C:\Windows\SysWOW64\connin.exe shchost.exe File opened for modification C:\Windows\SysWOW64\connin.exe shchost.exe File opened for modification C:\Windows\SysWOW64\discard.ini shchost.exe File created C:\Windows\SysWOW64\csrsse.exe dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language connin.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe 1792 connin.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 4840 csrsse.exe 4840 csrsse.exe 1132 shchost.exe 1792 connin.exe 1792 connin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4840 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 101 PID 3332 wrote to memory of 4840 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 101 PID 3332 wrote to memory of 4840 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 101 PID 3332 wrote to memory of 1132 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 102 PID 3332 wrote to memory of 1132 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 102 PID 3332 wrote to memory of 1132 3332 dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe 102 PID 1132 wrote to memory of 1792 1132 shchost.exe 103 PID 1132 wrote to memory of 1792 1132 shchost.exe 103 PID 1132 wrote to memory of 1792 1132 shchost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc61d58b65dbed835226b3047d9e9627_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\csrsse.exe"C:\Windows\system32\csrsse.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
C:\Windows\SysWOW64\shchost.exe"C:\Windows\system32\shchost.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\connin.exe"C:\Windows\system32\connin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4200,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4216 /prefetch:81⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5dc61d58b65dbed835226b3047d9e9627
SHA196a4ea8b2da428338c562d740c3749215d61914c
SHA256dd552663ded841be53ab2a2e5f55a158909558c96685163887d51008cfa5ead7
SHA512ed0e614d875c83ecd68df26ee9b22c22d4b539bbdd3c58b733a67598d370e517754374658532862ceddfdf17485ce866898a635469fefb0d52f97b8415831464
-
Filesize
20KB
MD5c02b6db53c70f38386ba2ba206176e08
SHA19c09f3f79da29878172421cc763730e2c817ecb3
SHA256fcf49c9a8777dfb900e727f503841949d571b15aae4d7c6c8e0c732f92253fdd
SHA5126851ce432b622b4e90423f60ca10c311b67a214af6029811da2b00a1867e5c0a19f0b3981495793ce66145133a1a6f858b3fa3b7cf8fd00f41a47bd01db25255
-
Filesize
105B
MD5ea6365b4ee4d3a429d98880eaa8058a6
SHA1a46d53dc00f6278ce869e0583c1bd28e159124f2
SHA256ddabafa993939c464374b973ab23d2a552ae8d3a93e4012b51b69feee22ef4a7
SHA5129a4a5d07b73751636365a27d59a6a026e8e591508a78720ed5315d4fbcb77da1faa0b70d51f09f1ea49ae8c15e1925c906b49927802289d71e12b5096911f526
-
Filesize
26B
MD5d8ab3ea023fda33b8017ccc4748534f8
SHA1e5c8b0f40ed03ad98f0d207ee073af2ee925db78
SHA25614776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab
SHA5120a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0
-
Filesize
20KB
MD548e4440c9c12f01eb9e6f0cd7d2e9439
SHA11b651537009a407ac184006db96936f6499a0645
SHA2561692845f38558923e866cc2b33602b759ee3dc12babd7e3bf6262293b4ce47b5
SHA512477b3dc7dee015bcd697d4a6f10996abceeb2b46300f4b33fcb733effd1ca3dc19e773b71b7a9fa335273ba5a6a9152189e78e067112be6223722e3efdcc694b
-
Filesize
768B
MD52a34374b4d0f0e978bee7bc5e09f2b2f
SHA11e4f63ee905711a61b39a46db76421e00438fe97
SHA2563e30d7259f0280f913527822e33c49f22438d10295e4f7eb8b1255f5ba38c4f3
SHA51299df465d8f4a4a74ea0b71f15c8354c941961f6626bd3616806d75297cb4610b7b3fb3986d2024675df3419533c0ececd8fc0ff6b69a0844bbd500f380db49c5