Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe
-
Size
575KB
-
MD5
f5808c47fb0cba23c0d41ec9ff37ee07
-
SHA1
980759888d77c3637a7de4d57c9f87f59b8f654c
-
SHA256
4d6e935ca3ede8ae7eeb30f18f489a93123605ee6ee2fe3869cc9d1751523e4e
-
SHA512
7d72fbf24255b6c2b322756019a975bf3cd289c7c7514982610b37d46f3197e62ae842da50b799d2d150716dd4f5d9ad184de4f5732a8e69138155248394471a
-
SSDEEP
12288:kEs/iRNp4QoFwxyR9XGbsnJNZErnXEJ69w0p8N:kEciRNp4QdyR9GxnXZ+v
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Sessmgr f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Sessmgr = "C:\\Windows\\System\\sessmgr.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Task Scheduler f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Task Scheduler = "C:\\Users\\Admin\\AppData\\Roaming\\mstinit.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 cisvc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cisvc f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cisvc = "C:\\ProgramData\\cisvc.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sessmgr f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sessmgr = "C:\\Windows\\sessmgr.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System\sessmgr.exe f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File opened for modification C:\Windows\System\RCX6B7B.tmp f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File created C:\Windows\sessmgr.exe f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File opened for modification C:\Windows\RCX6BBD.tmp f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File created C:\Windows\System\spoolsv.exe f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File opened for modification C:\Windows\System\RCX6BFF.tmp f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe File created C:\Windows\System\sessmgr.exe f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cisvc.exe -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Logman f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Logman = "C:\\ProgramData\\Microsoft\\logman.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Spooler = "C:\\Windows\\System\\spoolsv.exe" f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Spooler f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1860 3128 f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe 82 PID 3128 wrote to memory of 1860 3128 f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe 82 PID 3128 wrote to memory of 1860 3128 f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5808c47fb0cba23c0d41ec9ff37ee07_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\ProgramData\cisvc.exeC:\ProgramData\cisvc.exe /a 12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD5f5808c47fb0cba23c0d41ec9ff37ee07
SHA1980759888d77c3637a7de4d57c9f87f59b8f654c
SHA2564d6e935ca3ede8ae7eeb30f18f489a93123605ee6ee2fe3869cc9d1751523e4e
SHA5127d72fbf24255b6c2b322756019a975bf3cd289c7c7514982610b37d46f3197e62ae842da50b799d2d150716dd4f5d9ad184de4f5732a8e69138155248394471a
-
Filesize
10B
MD5b69816e8615b63811c89a99f7d686dab
SHA1844dbf038d142375cfd75bfa88bff3fc4e2079f4
SHA256cd8e50077c7e4b26922c5b50f452ec804117d279db6110b697a9d6283c0e0427
SHA512d03c2cb79fe8a44bab2bd190e40ad268e2817275693905bc5a6da829c1c5c2caf898f979a0d7885e295b65f88fec752e755551502236f7a4a8287d8170f1d593
-
Filesize
575KB
MD5f35281969e62c4d775967434b14fa230
SHA169b520ac5e04a4aa5deb177e3836b6a352e8bf86
SHA256834141038b08c3f827c073c6d8df84644b4de1511ed4c1827ff62599fcced381
SHA5125a100ddef133bc4d35bb66898a825afe3321beb6a03286306e9e00e2db8e6b961a135c7172a5fb2b4e2e0d4330142e8fddd680ca887ecd606cc6668e8f470f28