Analysis
-
max time kernel
7s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe
Resource
win7-20240903-en
Errors
General
-
Target
fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe
-
Size
60KB
-
MD5
fa9f11ac92ff66b24af0d2bc08fd3061
-
SHA1
85ac53134b6173c7f54b95b4d814348320798b05
-
SHA256
675bc799ed57fa96a32acf0baea68723f246106f2cb9a9c42acd230d3c2a5cd3
-
SHA512
755461ac7664b97365080b8242d00fcff350a2a9918af3a59c22077cf3df7c0e0065afe007857dac14ce3d5d9b5659eb471d4f0f13858afae493a70cfe116ead
-
SSDEEP
768:GTANmSXnJ0vS0Be06Zmbkx+uR8pNQVeqEbh9c8FgcZMVq2ZXhwfXXqVvKeBKGsJ5:QYJsjWo20pjrCJXhQXXqVieYJ/vhVNT
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Deletes itself 1 IoCs
pid Process 1076 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 988 250C87F24489D3BAFE18.exe -
Loads dropped DLL 1 IoCs
pid Process 1076 svchost.exe -
resource yara_rule behavioral1/memory/3044-2-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/3044-6-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/988-21-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250C87F24489D3BAFE18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeSystemProfilePrivilege 1076 svchost.exe Token: SeBackupPrivilege 2260 vssvc.exe Token: SeRestorePrivilege 2260 vssvc.exe Token: SeAuditPrivilege 2260 vssvc.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeRestorePrivilege 2892 DrvInst.exe Token: SeLoadDriverPrivilege 2892 DrvInst.exe Token: SeLoadDriverPrivilege 2892 DrvInst.exe Token: SeLoadDriverPrivilege 2892 DrvInst.exe Token: SeShutdownPrivilege 1800 shutdown.exe Token: SeRemoteShutdownPrivilege 1800 shutdown.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1076 3044 fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe 30 PID 3044 wrote to memory of 1076 3044 fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe 30 PID 3044 wrote to memory of 1076 3044 fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe 30 PID 3044 wrote to memory of 1076 3044 fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe 30 PID 3044 wrote to memory of 1076 3044 fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe 30 PID 1076 wrote to memory of 1972 1076 svchost.exe 31 PID 1076 wrote to memory of 1972 1076 svchost.exe 31 PID 1076 wrote to memory of 1972 1076 svchost.exe 31 PID 1076 wrote to memory of 1972 1076 svchost.exe 31 PID 1076 wrote to memory of 1800 1076 svchost.exe 37 PID 1076 wrote to memory of 1800 1076 svchost.exe 37 PID 1076 wrote to memory of 1800 1076 svchost.exe 37 PID 1076 wrote to memory of 1800 1076 svchost.exe 37 PID 1076 wrote to memory of 988 1076 svchost.exe 38 PID 1076 wrote to memory of 988 1076 svchost.exe 38 PID 1076 wrote to memory of 988 1076 svchost.exe 38 PID 1076 wrote to memory of 988 1076 svchost.exe 38 PID 988 wrote to memory of 784 988 250C87F24489D3BAFE18.exe 41 PID 988 wrote to memory of 784 988 250C87F24489D3BAFE18.exe 41 PID 988 wrote to memory of 784 988 250C87F24489D3BAFE18.exe 41 PID 988 wrote to memory of 784 988 250C87F24489D3BAFE18.exe 41 PID 988 wrote to memory of 784 988 250C87F24489D3BAFE18.exe 41 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa9f11ac92ff66b24af0d2bc08fd3061_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Disables RegEdit via registry modification
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"3⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown.exe -r -f -t 03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\250C87F24489D3BAFE18.exeC:\Users\Admin\AppData\Local\Temp\250C87F24489D3BAFE18.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C4" "0000000000000574"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:480
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5fa9f11ac92ff66b24af0d2bc08fd3061
SHA185ac53134b6173c7f54b95b4d814348320798b05
SHA256675bc799ed57fa96a32acf0baea68723f246106f2cb9a9c42acd230d3c2a5cd3
SHA512755461ac7664b97365080b8242d00fcff350a2a9918af3a59c22077cf3df7c0e0065afe007857dac14ce3d5d9b5659eb471d4f0f13858afae493a70cfe116ead