Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 08:33
Behavioral task
behavioral1
Sample
ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe
-
Size
218KB
-
MD5
ed367dab295de456f86d3bb87c471bb3
-
SHA1
47f28e25106ce0a8b2f55f767b2e90f927183319
-
SHA256
c2f76ee6aa8f218e960926beb62fd69139eba55eee459f0651a98cc9ac806add
-
SHA512
e24acf6fdddde4dc7aa8b9197fb7431045fd5320a90701c4c392cf77458827ce97f10bc5994679bfd37d9ec20f7092e6bc8b4872f39f92b064b7866f1df3f903
-
SSDEEP
6144:nc+yiZtsqepeFe5bc2pIHhY18Nih7uawcs:n9y2tsqmmYbclHq1e+yawc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Program Files\\Common Files\\inf\\svhost.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Program Files\\Common Files\\inf\\svhost.exe" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x0000000000D57000-memory.dmp upx -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 2580 cmd.exe 944 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\inf attrib.exe File opened for modification C:\Program Files\Common Files\inf\svhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1612 reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2684 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3064 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 30 PID 2080 wrote to memory of 3064 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 30 PID 2080 wrote to memory of 3064 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 30 PID 2080 wrote to memory of 3064 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 30 PID 2080 wrote to memory of 1056 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 32 PID 2080 wrote to memory of 1056 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 32 PID 2080 wrote to memory of 1056 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 32 PID 2080 wrote to memory of 1056 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 32 PID 2080 wrote to memory of 2220 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 34 PID 2080 wrote to memory of 2220 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 34 PID 2080 wrote to memory of 2220 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 34 PID 2080 wrote to memory of 2220 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 34 PID 3064 wrote to memory of 2708 3064 cmd.exe 35 PID 3064 wrote to memory of 2708 3064 cmd.exe 35 PID 3064 wrote to memory of 2708 3064 cmd.exe 35 PID 3064 wrote to memory of 2708 3064 cmd.exe 35 PID 2080 wrote to memory of 2776 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 37 PID 2080 wrote to memory of 2776 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 37 PID 2080 wrote to memory of 2776 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 37 PID 2080 wrote to memory of 2776 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 37 PID 2080 wrote to memory of 2832 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 39 PID 2080 wrote to memory of 2832 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 39 PID 2080 wrote to memory of 2832 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 39 PID 2080 wrote to memory of 2832 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 39 PID 2708 wrote to memory of 2684 2708 cmd.exe 40 PID 2708 wrote to memory of 2684 2708 cmd.exe 40 PID 2708 wrote to memory of 2684 2708 cmd.exe 40 PID 2708 wrote to memory of 2684 2708 cmd.exe 40 PID 2080 wrote to memory of 2564 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 42 PID 2080 wrote to memory of 2564 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 42 PID 2080 wrote to memory of 2564 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 42 PID 2080 wrote to memory of 2564 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 42 PID 2080 wrote to memory of 944 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 43 PID 2080 wrote to memory of 944 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 43 PID 2080 wrote to memory of 944 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 43 PID 2080 wrote to memory of 944 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 43 PID 1056 wrote to memory of 2740 1056 cmd.exe 44 PID 1056 wrote to memory of 2740 1056 cmd.exe 44 PID 1056 wrote to memory of 2740 1056 cmd.exe 44 PID 1056 wrote to memory of 2740 1056 cmd.exe 44 PID 2776 wrote to memory of 1612 2776 cmd.exe 46 PID 2776 wrote to memory of 1612 2776 cmd.exe 46 PID 2776 wrote to memory of 1612 2776 cmd.exe 46 PID 2776 wrote to memory of 1612 2776 cmd.exe 46 PID 2220 wrote to memory of 2584 2220 cmd.exe 48 PID 2220 wrote to memory of 2584 2220 cmd.exe 48 PID 2220 wrote to memory of 2584 2220 cmd.exe 48 PID 2220 wrote to memory of 2584 2220 cmd.exe 48 PID 2080 wrote to memory of 2580 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 49 PID 2080 wrote to memory of 2580 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 49 PID 2080 wrote to memory of 2580 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 49 PID 2080 wrote to memory of 2580 2080 ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe 49 PID 2832 wrote to memory of 2008 2832 cmd.exe 51 PID 2832 wrote to memory of 2008 2832 cmd.exe 51 PID 2832 wrote to memory of 2008 2832 cmd.exe 51 PID 2832 wrote to memory of 2008 2832 cmd.exe 51 PID 944 wrote to memory of 2552 944 cmd.exe 53 PID 944 wrote to memory of 2552 944 cmd.exe 53 PID 944 wrote to memory of 2552 944 cmd.exe 53 PID 944 wrote to memory of 2552 944 cmd.exe 53 PID 2564 wrote to memory of 2672 2564 cmd.exe 52 PID 2564 wrote to memory of 2672 2564 cmd.exe 52 PID 2564 wrote to memory of 2672 2564 cmd.exe 52 PID 2564 wrote to memory of 2672 2564 cmd.exe 52 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2572 attrib.exe 2552 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c cmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe" "C:\Program Files\Common Files\inf\svhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c cmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe" "C:\Program Files\Common Files\inf\svhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\ed367dab295de456f86d3bb87c471bb3_JaffaCakes118.exe" "C:\Program Files\Common Files\inf\svhost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2684
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v shell /t reg_sz /d "C:\Program Files\Common Files\inf\svhost.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v shell /t reg_sz /d "C:\Program Files\Common Files\inf\svhost.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v shell /t reg_sz /d "C:\Program Files\Common Files\inf\svhost.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon " /v shell /t reg_sz /d "C:\Program Files\Common Files\inf\svhost.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d "1" /f3⤵
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\reg.exereg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /f3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\inf\svhost.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\inf\svhost.exe"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Common Files\inf"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Common Files\inf"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
3