Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe
-
Size
32KB
-
MD5
ecb292ff0547fc44a0984ea0a8e32b59
-
SHA1
1ec8bfdb056e1fdb36acd83db765565aa75123b0
-
SHA256
33aa56d6ae850e551f45e4f5d2db217935c807f4d5bcda78d4d651210e6525ca
-
SHA512
a5830c065468e8782b8a0444569df98cb21dd51b893af76d2163ac3cea840943ff1493727adcfc7b33f9f4f52a25c69c07ba881d25bd3fea5c5390884d6e70fb
-
SSDEEP
384:XdFKhMjstW2OlSvdgf0ScYrm8HAD0I6baD3W4qhzEc:qOHpv1VgD0Iag7t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCMonitor = "C:\\Windows\\csrrs.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCMonitor = "C:\\Windows\\csrrs.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCMonitor = "C:\\Windows\\csrrs.exe" reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrrs.exe ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe File opened for modification C:\Windows\csrrs.exe ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1836 reg.exe 3608 reg.exe 2392 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 880 wrote to memory of 4572 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 91 PID 880 wrote to memory of 4572 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 91 PID 880 wrote to memory of 4572 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 91 PID 880 wrote to memory of 4672 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 92 PID 880 wrote to memory of 4672 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 92 PID 880 wrote to memory of 4672 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 92 PID 4572 wrote to memory of 3620 4572 cmd.exe 95 PID 4572 wrote to memory of 3620 4572 cmd.exe 95 PID 4572 wrote to memory of 3620 4572 cmd.exe 95 PID 4672 wrote to memory of 3608 4672 cmd.exe 96 PID 4672 wrote to memory of 3608 4672 cmd.exe 96 PID 4672 wrote to memory of 3608 4672 cmd.exe 96 PID 880 wrote to memory of 3064 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 97 PID 880 wrote to memory of 3064 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 97 PID 880 wrote to memory of 3064 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 97 PID 880 wrote to memory of 2456 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 98 PID 880 wrote to memory of 2456 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 98 PID 880 wrote to memory of 2456 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 98 PID 2456 wrote to memory of 2392 2456 cmd.exe 102 PID 2456 wrote to memory of 2392 2456 cmd.exe 102 PID 2456 wrote to memory of 2392 2456 cmd.exe 102 PID 3064 wrote to memory of 4432 3064 cmd.exe 101 PID 3064 wrote to memory of 4432 3064 cmd.exe 101 PID 3064 wrote to memory of 4432 3064 cmd.exe 101 PID 880 wrote to memory of 1308 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 103 PID 880 wrote to memory of 1308 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 103 PID 880 wrote to memory of 1308 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 103 PID 880 wrote to memory of 3896 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 104 PID 880 wrote to memory of 3896 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 104 PID 880 wrote to memory of 3896 880 ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe 104 PID 1308 wrote to memory of 2196 1308 cmd.exe 107 PID 1308 wrote to memory of 2196 1308 cmd.exe 107 PID 1308 wrote to memory of 2196 1308 cmd.exe 107 PID 3896 wrote to memory of 1836 3896 cmd.exe 108 PID 3896 wrote to memory of 1836 3896 cmd.exe 108 PID 3896 wrote to memory of 1836 3896 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecb292ff0547fc44a0984ea0a8e32b59_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v PCMonitor /t REG_SZ /d C:\Windows\csrrs.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1836
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
32KB
MD5ecb292ff0547fc44a0984ea0a8e32b59
SHA11ec8bfdb056e1fdb36acd83db765565aa75123b0
SHA25633aa56d6ae850e551f45e4f5d2db217935c807f4d5bcda78d4d651210e6525ca
SHA512a5830c065468e8782b8a0444569df98cb21dd51b893af76d2163ac3cea840943ff1493727adcfc7b33f9f4f52a25c69c07ba881d25bd3fea5c5390884d6e70fb