Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe
-
Size
256KB
-
MD5
ece5858c70983dd9d652a0a1de80743e
-
SHA1
0eae8ab45f599b92a9e418650fda9fbac094b6c8
-
SHA256
9505d638bcf08341b06d9ecc14979285d5cfa0099c95ed5798943714ce01ca63
-
SHA512
66b7f46205ea6c4100e35913c5ab0957d6e3dbb4e90b0f211f5d0e94b09b0dc3ab7472d5a9327d8865c38472f5825ad1d1bf9cfb01a59aaef203522bff22bd7e
-
SSDEEP
3072:4vvCbVjE/ZZevZR7hm4wsX523PK9gSxbyZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ2:bzThm4wC523i/TTHUkjHxw/Y
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Microsoft Windows Hosting Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe" csrss.exe -
Deletes itself 1 IoCs
pid Process 2840 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2836 csrss.exe 2540 csrss.exe -
Loads dropped DLL 3 IoCs
pid Process 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 2836 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Hosting Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Hosting Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe" csrss.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Microsoft Windows Firewall Service = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe" csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2288 set thread context of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2836 set thread context of 2540 2836 csrss.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 2836 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2732 2288 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2840 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2840 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2840 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2840 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 31 PID 2732 wrote to memory of 2836 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2836 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2836 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2836 2732 ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe 33 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 PID 2836 wrote to memory of 2540 2836 csrss.exe 34 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations\LowRiskFileTypes = ".exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations\DefaultFileTypeRisk = "808464432" csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rm.bat" C:\Users\Admin\AppData\Local\Temp\ece5858c70983dd9d652a0a1de80743e_JaffaCakes118.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System policy modification
PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD551a5a023b38ea11bbbdce87eef7e63c2
SHA10d71001ece8a8efdecf1c957f009e4324a170063
SHA256f3434d49b5114ab593be0cd3d3a9af962d00616a9368fd25129fcbea32a5d602
SHA512bd63eb9e0d449611a5785f08a71e577669e6370b0f16fa678289841a07c30097f269e02eae7f3d761dafcc0fa58cc22433e9edfb56159f1dbd48e217f98335ec
-
Filesize
256KB
MD5ece5858c70983dd9d652a0a1de80743e
SHA10eae8ab45f599b92a9e418650fda9fbac094b6c8
SHA2569505d638bcf08341b06d9ecc14979285d5cfa0099c95ed5798943714ce01ca63
SHA51266b7f46205ea6c4100e35913c5ab0957d6e3dbb4e90b0f211f5d0e94b09b0dc3ab7472d5a9327d8865c38472f5825ad1d1bf9cfb01a59aaef203522bff22bd7e