Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:36
Static task
static1
Behavioral task
behavioral1
Sample
eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe
-
Size
136KB
-
MD5
eaaebfb1302b56bc77ba10bead1c1f1c
-
SHA1
28755462764576db23cabc3c8bdbb474614bcc55
-
SHA256
4c2aeff95b92fd749d71c2420fe428a2fea39b1f51db1ad6e120e3d126e575eb
-
SHA512
48260911756fbbae8b77e0b83db225b65d61d2e0492702aa1ce239776759744e1b59dc0b3054a02a4e3b5c4a773196c169d5c3dbc2fb1566be8809b25304423a
-
SSDEEP
3072:XOK317YNJN6L+RRWRtZhbNqVy+NTH5RGwBlas5rJIIEPN8UTZgujsxdH6Pr1fvIk:Xl7YNJN6L+RRWRtZhbNqVyIRGwBl9rJ0
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.ex = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.ex:*:Enabled:@xpsp2res.dll,-22019" eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "winupdate.exe" eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\windows32.dll eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winupdate.exe eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe File opened for modification C:\Windows\winupdate.exe eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaaebfb1302b56bc77ba10bead1c1f1c_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1