Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
-
Size
918KB
-
MD5
dcd63f6b7cf6e396b3e5579097c62702
-
SHA1
2be5160becfb913db5edb3406bd38d635bf295da
-
SHA256
6d6f85116a069457cb63241a70b8330e2585d6d0b6d59dfd25ccae562c9105ae
-
SHA512
24cf2c6552f4a20512b0cba45880493f1e24cce1f1dbc5f29787e2174d90cdb523804d50e98a3595720efb1c1d8fc15538414c671b710e273811c4d0ccf8dc24
-
SSDEEP
24576:OxqT31T6WE6I5jKqosOm+bBNghrofkG0V:Z6WE6IN95+bBNgikG0V
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1944 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 csrcs.exe -
Loads dropped DLL 6 IoCs
pid Process 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 2392 csrcs.exe 2392 csrcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000012117-13.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\csrcs.exe dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe File created C:\Windows\SysWOW64\csrcs.exe dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2348 PING.EXE 988 PING.EXE 2844 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2844 PING.EXE 2348 PING.EXE 988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 2392 csrcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 2392 csrcs.exe 2392 csrcs.exe 2392 csrcs.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 2392 csrcs.exe 2392 csrcs.exe 2392 csrcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2392 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2392 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2392 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2392 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2672 2392 csrcs.exe 31 PID 2392 wrote to memory of 2672 2392 csrcs.exe 31 PID 2392 wrote to memory of 2672 2392 csrcs.exe 31 PID 2392 wrote to memory of 2672 2392 csrcs.exe 31 PID 2672 wrote to memory of 2348 2672 cmd.exe 33 PID 2672 wrote to memory of 2348 2672 cmd.exe 33 PID 2672 wrote to memory of 2348 2672 cmd.exe 33 PID 2672 wrote to memory of 2348 2672 cmd.exe 33 PID 3048 wrote to memory of 1944 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 34 PID 3048 wrote to memory of 1944 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 34 PID 3048 wrote to memory of 1944 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 34 PID 3048 wrote to memory of 1944 3048 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 34 PID 1944 wrote to memory of 988 1944 cmd.exe 36 PID 1944 wrote to memory of 988 1944 cmd.exe 36 PID 1944 wrote to memory of 988 1944 cmd.exe 36 PID 1944 wrote to memory of 988 1944 cmd.exe 36 PID 2672 wrote to memory of 2844 2672 cmd.exe 37 PID 2672 wrote to memory of 2844 2672 cmd.exe 37 PID 2672 wrote to memory of 2844 2672 cmd.exe 37 PID 2672 wrote to memory of 2844 2672 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2348
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:988
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD537f112d5fc1c7ba50888502179abc321
SHA1e8118f8a1013061148dfa9e56d736317f3255d5a
SHA256ecbf207d7848938fc6428660e58cfc75704a8d4ef21e0669a50ac2596438a334
SHA512cb6c139bdeab4425c3621ee923e6ea17ef00653f45b3df9bf38dfa5e6a71ef0195ce6cbd479778338281541a96207903f0213b3fa3e253aa1d52bf647518d404
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD55d5bfdf908f0be14473194078c2d65bc
SHA11c0693180fd40ef6b6f15a5e169f5d76f88989da
SHA2562fd43ac3928a37c807e67b43e3536bbda7ba353bd8232dcdcd01e6d10067a148
SHA512827edaeca7b7a1e749c8a3ae359519653b674c71ca0e8b1318d7f683c04089a1c21c9b0e316eada6c3b816c5f0b634cdef494ddbbd22813faa684cca528c334c
-
Filesize
918KB
MD5dcd63f6b7cf6e396b3e5579097c62702
SHA12be5160becfb913db5edb3406bd38d635bf295da
SHA2566d6f85116a069457cb63241a70b8330e2585d6d0b6d59dfd25ccae562c9105ae
SHA51224cf2c6552f4a20512b0cba45880493f1e24cce1f1dbc5f29787e2174d90cdb523804d50e98a3595720efb1c1d8fc15538414c671b710e273811c4d0ccf8dc24