Analysis
-
max time kernel
95s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe
-
Size
918KB
-
MD5
dcd63f6b7cf6e396b3e5579097c62702
-
SHA1
2be5160becfb913db5edb3406bd38d635bf295da
-
SHA256
6d6f85116a069457cb63241a70b8330e2585d6d0b6d59dfd25ccae562c9105ae
-
SHA512
24cf2c6552f4a20512b0cba45880493f1e24cce1f1dbc5f29787e2174d90cdb523804d50e98a3595720efb1c1d8fc15538414c671b710e273811c4d0ccf8dc24
-
SSDEEP
24576:OxqT31T6WE6I5jKqosOm+bBNghrofkG0V:Z6WE6IN95+bBNgikG0V
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 csrcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000002327a-12.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5024 PING.EXE 3844 PING.EXE 1944 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5024 PING.EXE 3844 PING.EXE 1944 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3316 csrcs.exe 3316 csrcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3316 csrcs.exe 3316 csrcs.exe 3316 csrcs.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 3316 csrcs.exe 3316 csrcs.exe 3316 csrcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3316 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 86 PID 4952 wrote to memory of 3316 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 86 PID 4952 wrote to memory of 3316 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 86 PID 3316 wrote to memory of 4224 3316 csrcs.exe 89 PID 3316 wrote to memory of 4224 3316 csrcs.exe 89 PID 3316 wrote to memory of 4224 3316 csrcs.exe 89 PID 4224 wrote to memory of 5024 4224 cmd.exe 91 PID 4224 wrote to memory of 5024 4224 cmd.exe 91 PID 4224 wrote to memory of 5024 4224 cmd.exe 91 PID 4952 wrote to memory of 2984 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 94 PID 4952 wrote to memory of 2984 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 94 PID 4952 wrote to memory of 2984 4952 dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe 94 PID 2984 wrote to memory of 3844 2984 cmd.exe 96 PID 2984 wrote to memory of 3844 2984 cmd.exe 96 PID 2984 wrote to memory of 3844 2984 cmd.exe 96 PID 4224 wrote to memory of 1944 4224 cmd.exe 99 PID 4224 wrote to memory of 1944 4224 cmd.exe 99 PID 4224 wrote to memory of 1944 4224 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcd63f6b7cf6e396b3e5579097c62702_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5024
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1944
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3844
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD537f112d5fc1c7ba50888502179abc321
SHA1e8118f8a1013061148dfa9e56d736317f3255d5a
SHA256ecbf207d7848938fc6428660e58cfc75704a8d4ef21e0669a50ac2596438a334
SHA512cb6c139bdeab4425c3621ee923e6ea17ef00653f45b3df9bf38dfa5e6a71ef0195ce6cbd479778338281541a96207903f0213b3fa3e253aa1d52bf647518d404
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
251B
MD55d5bfdf908f0be14473194078c2d65bc
SHA11c0693180fd40ef6b6f15a5e169f5d76f88989da
SHA2562fd43ac3928a37c807e67b43e3536bbda7ba353bd8232dcdcd01e6d10067a148
SHA512827edaeca7b7a1e749c8a3ae359519653b674c71ca0e8b1318d7f683c04089a1c21c9b0e316eada6c3b816c5f0b634cdef494ddbbd22813faa684cca528c334c
-
Filesize
918KB
MD5dcd63f6b7cf6e396b3e5579097c62702
SHA12be5160becfb913db5edb3406bd38d635bf295da
SHA2566d6f85116a069457cb63241a70b8330e2585d6d0b6d59dfd25ccae562c9105ae
SHA51224cf2c6552f4a20512b0cba45880493f1e24cce1f1dbc5f29787e2174d90cdb523804d50e98a3595720efb1c1d8fc15538414c671b710e273811c4d0ccf8dc24