Analysis
-
max time kernel
145s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe
-
Size
42KB
-
MD5
eee02924a9737101e34396835d9e94ee
-
SHA1
ad861a3c587bd8b3fc898daf9310098d79b43ae7
-
SHA256
75ce21e244d0617e8b6d45125c4d837864f3edd95a5c20bf0b5945ccf35b54b9
-
SHA512
cf1785259dd97e2a63eee77887e9c027a6d5f03162e4e7a2ecd1dc5354c7fb94387b86848002a78b0987ed659a9f33e7dd31a7a18534375cbe02a403f188cea9
-
SSDEEP
768:3rGq8ftXfbp1Pz20GnlTKSTkXjJpUYfsW+NUmYSAP352PYBQVz/dbRqeOK+v:3rGqW12BrUP3UCvPaVzdbRRdS
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 3020 netsh.exe 2720 netsh.exe 2344 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2104 services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\file.bat eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe File created C:\Windows\services.exe eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe File opened for modification C:\Windows\services.exe eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe File created C:\Windows\file.bat services.exe File created C:\Windows\services.exe services.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3068 1620 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Desktop services.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Desktop\id = "515154204763" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Desktop\host = "91.207.7.234" services.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2956 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2956 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2956 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2956 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 30 PID 2956 wrote to memory of 2344 2956 cmd.exe 32 PID 2956 wrote to memory of 2344 2956 cmd.exe 32 PID 2956 wrote to memory of 2344 2956 cmd.exe 32 PID 2956 wrote to memory of 2344 2956 cmd.exe 32 PID 1620 wrote to memory of 2104 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 33 PID 1620 wrote to memory of 2104 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 33 PID 1620 wrote to memory of 2104 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 33 PID 1620 wrote to memory of 2104 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 33 PID 1620 wrote to memory of 3068 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 34 PID 1620 wrote to memory of 3068 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 34 PID 1620 wrote to memory of 3068 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 34 PID 1620 wrote to memory of 3068 1620 eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe 34 PID 2104 wrote to memory of 3012 2104 services.exe 35 PID 2104 wrote to memory of 3012 2104 services.exe 35 PID 2104 wrote to memory of 3012 2104 services.exe 35 PID 2104 wrote to memory of 3012 2104 services.exe 35 PID 3012 wrote to memory of 3020 3012 cmd.exe 37 PID 3012 wrote to memory of 3020 3012 cmd.exe 37 PID 3012 wrote to memory of 3020 3012 cmd.exe 37 PID 3012 wrote to memory of 3020 3012 cmd.exe 37 PID 2104 wrote to memory of 2664 2104 services.exe 38 PID 2104 wrote to memory of 2664 2104 services.exe 38 PID 2104 wrote to memory of 2664 2104 services.exe 38 PID 2104 wrote to memory of 2664 2104 services.exe 38 PID 2664 wrote to memory of 2720 2664 cmd.exe 40 PID 2664 wrote to memory of 2720 2664 cmd.exe 40 PID 2664 wrote to memory of 2720 2664 cmd.exe 40 PID 2664 wrote to memory of 2720 2664 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eee02924a9737101e34396835d9e94ee_JaffaCakes118.exe"1⤵
- Windows security bypass
- Windows security modification
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\services.exe" services.exe ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 1722⤵
- Program crash
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD50c37570e7decca15d0dcd5ee2957371d
SHA1db5dd323003574a3f3c4932c1256bb792bedcfd2
SHA256d493ab01e5d583d327bd94ba7403d4a73693b61f708752c6deb45f55477b0107
SHA512ac2d818f7eb11fce1b4b84fd667213a9c392d064b13c1470f104ef815fa6920a8ffb7c1bdf00ef808604c00d7a8dd0916738256d231303ec3084b8d29ceaa3cd
-
Filesize
40B
MD5f5e059efe5ed14466033f1f4357a4a4b
SHA1ccb28b2be69275c38738947e790c10a2382302c2
SHA256c7d0b4156b557c67d3e758d86a45e31c70110c989e679097f52f3edaf4963e21
SHA512d36ef9a9fe8b42951648933fdc41b9b61077bfb4221360f9308104f05e88d17ffdb07948a29858d2f4371db1def154cc4b4be57304c322934a763f6e8b8872de
-
Filesize
42KB
MD5eee02924a9737101e34396835d9e94ee
SHA1ad861a3c587bd8b3fc898daf9310098d79b43ae7
SHA25675ce21e244d0617e8b6d45125c4d837864f3edd95a5c20bf0b5945ccf35b54b9
SHA512cf1785259dd97e2a63eee77887e9c027a6d5f03162e4e7a2ecd1dc5354c7fb94387b86848002a78b0987ed659a9f33e7dd31a7a18534375cbe02a403f188cea9