Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:12
Behavioral task
behavioral1
Sample
ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe
-
Size
510KB
-
MD5
ec030d3276115a3c890665b0725585f5
-
SHA1
5c7a2b3f748602f9c43b254e46b196eaab93d78e
-
SHA256
331a1d704573224a0efc415feaf7b3666d3739ea1a03d0af1248687f065e9b3d
-
SHA512
95af61fcd6ee514ff612283f69c182c6c89c0074b395374ada4a6cd110914a75da624c48b9d76009f68adc6fa985ef8b87b873a0a51a271c09ce8f4239fa3d42
-
SSDEEP
12288:4M7VEBOPLt0/mAz36UHcTNN6Fi4o7A7Epu4ETMWYtLdZUkN1Oa6BGm7:17VEUPe/mc85Vu7M1LWBp7
Malware Config
Extracted
latentbot
snaggelpuss123.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 MINECRAFT.EXE 2688 MINECRAFT.EXE -
Loads dropped DLL 4 IoCs
pid Process 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1924-0-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral1/memory/580-3-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-6-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/1924-9-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral1/memory/580-2-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-12-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-11-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-10-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-94-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-92-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-93-0x0000000013140000-0x000000001326F000-memory.dmp upx behavioral1/memory/580-119-0x0000000013140000-0x000000001326F000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINECRAFT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINECRAFT.EXE -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSecurityPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeLoadDriverPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemProfilePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemtimePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeBackupPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeRestorePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeShutdownPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeDebugPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeUndockPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeManageVolumePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeImpersonatePrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 33 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 34 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe Token: 35 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2684 javaw.exe 2572 javaw.exe 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 2572 javaw.exe 2684 javaw.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 1924 wrote to memory of 580 1924 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 31 PID 580 wrote to memory of 2508 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 32 PID 580 wrote to memory of 2508 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 32 PID 580 wrote to memory of 2508 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 32 PID 580 wrote to memory of 2508 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 32 PID 2508 wrote to memory of 2684 2508 MINECRAFT.EXE 33 PID 2508 wrote to memory of 2684 2508 MINECRAFT.EXE 33 PID 2508 wrote to memory of 2684 2508 MINECRAFT.EXE 33 PID 2508 wrote to memory of 2684 2508 MINECRAFT.EXE 33 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2820 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 34 PID 580 wrote to memory of 2688 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 35 PID 580 wrote to memory of 2688 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 35 PID 580 wrote to memory of 2688 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 35 PID 580 wrote to memory of 2688 580 ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe 35 PID 2688 wrote to memory of 2572 2688 MINECRAFT.EXE 36 PID 2688 wrote to memory of 2572 2688 MINECRAFT.EXE 36 PID 2688 wrote to memory of 2572 2688 MINECRAFT.EXE 36 PID 2688 wrote to memory of 2572 2688 MINECRAFT.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec030d3276115a3c890665b0725585f5_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xms512m -Xmx1024m -jar "C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"4⤵
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xms512m -Xmx1024m -jar "C:\Users\Admin\AppData\Local\Temp\MINECRAFT.EXE"4⤵
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD50f1931e26c21219db1c90e90037f11f6
SHA174b65f7fb7fa197d413ba5bc45cf10304deb4ecc
SHA256f4d54e35b857b5dfbca6fefcff5ab5599ce30b62eef7deded6594c5be93d25c3
SHA5120c6a90034e5852915af61ccc091568cb636f583d4c4b5cca8bfc3f7f86bbf6a79f16c324d723c1d3968d7996071bb85a79cd6fde682bb4bfeedfd770b7b8e817
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1488793075-819845221-1497111674-1000\83aa4cc77f591dfc2374580bbd95f6ba_18cc84e5-41c1-45e6-bdc9-06ff0c9e128a
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd