Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
-
Size
262KB
-
MD5
ee702697678035626ed75f89fa7bcdb5
-
SHA1
8f3a29e20470462d2cf1f66bcc14b6d90ebfc605
-
SHA256
08bd4c6afb3cf682b949bc4b1853a2e98b14d37569dd61d21724e6cc0c75ef53
-
SHA512
e23981d512c2892097d502cd9da929a34e9f2e824ccaaca5cb7c11bccb425f6a33247db042fb9cf9eb323e99909647312687234220ba759ab7014e81b2abffae
-
SSDEEP
6144:lqCbbe+R6SjMbnysLWN682NCYRDXlcTwgLnJF8UF7w68q5:pbe+IlbnBiNHYDVYwgLJFNF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1568 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5772ba9c = "C:\\Windows\\apppatch\\svchost.exe" ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5772ba9c = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1568 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1568 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1568 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1568 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1568 2552 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5513d89736200a552b576cfd55d57ed4c
SHA11d9efb38307e71b433d2d927de37414a97e9cae2
SHA2565e69c2a9a7664a3364b4011bac7a00ba95dbee06e9ccc478ab4e11add2bdec05
SHA5120a2a28259c11cc074bea2de481220c2d01ff87f6fb3aa7a1edc063062f3c587e4cb1e0c4ef0be86a120451831180cad951145280bbb4eff5c98563622469dca6