Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe
-
Size
966KB
-
MD5
ff8474d470fdc01c846c76a7b8d8e227
-
SHA1
83335bf4fe9bd1b6a9da68c6db47de241d962fb4
-
SHA256
202b03238891fc5dc5b078d02b9ca9daa26d0c1f338930563d88eca728c5df71
-
SHA512
e1863ea8fce0c3af0901443513b0d65b9b792ea5aff9a7c60947f713669e60ed60b778e3dc4aeb5e1d29c554754e471f87f049e4d04bbacee978081130b887f3
-
SSDEEP
24576:tMMSw3gK+vH1+F0QrOFEk908IkpVd1mqUp+:uZ1KHF0qg9N37d1mtE
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\scrss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\scrss.exe \"" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2244 setup.exe 2596 scrss.exe -
Loads dropped DLL 10 IoCs
pid Process 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2596 scrss.exe 2596 scrss.exe 2596 scrss.exe 2596 scrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2876 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2244 setup.exe 2596 scrss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2244 setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 scrss.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2452 wrote to memory of 2244 2452 ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2596 2244 setup.exe 31 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2244 wrote to memory of 2136 2244 setup.exe 32 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2136 wrote to memory of 2872 2136 cmd.exe 34 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35 PID 2872 wrote to memory of 2876 2872 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff8474d470fdc01c846c76a7b8d8e227_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\scrss.exe"C:\Users\Admin\AppData\Local\scrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c syscheck.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V scrss.exe /D "\"C:\Users\Admin\AppData\Local\scrss.exe \"" /f5⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD50d92b381efa1a49bd3cc2cf3ff28bd45
SHA123fac6be89436f94a4f8fca5057be514c787b9b6
SHA256b5b5a4055d2b10d9e6af0580c28ee9099632cc36eaa946ce442f65a77ee92e84
SHA51278b611a37cf21a0bb26204f0f3057b5d800be3c2ad8190af06725e82bdcc883473cb0087f1f7bc8c0199467d14282ea92d340421d8bf796f7e45451727f66391
-
Filesize
538KB
MD5f7d222333d3ce07721e18537287a1f23
SHA153253d51525d1979907b985dfc88097f068491f2
SHA256267ac2410719782b180d9776d9c61d86616d5a5762d97013566079b067fcb70a
SHA51202a57569478a5f9c7d68a0a2b9fb855d8b753a7fc8e5fe7875af1a877dbbc8016b88ad3be64a271a44992ff664976abdb017bab493a1168e4963c993e991b7bb
-
Filesize
92KB
MD58a5e40eb6518353e5758e5b237897c78
SHA1dd452e565485f48c2131dadc40a32b0d3007cef6
SHA2565f8ba5c1522847452d92b507770bfb454548d8a02232040c6be4323792400d4f
SHA512c941b82c3bd6be61506ac9215ab8e26983a8654444703b5a0236739a3b50a498ed0c65054b68481c026123d88b0f0e9e36f92b0f0028b4cc034345ec17f3b268
-
Filesize
237KB
MD5624edbd68e18dea398619afee2527dac
SHA1dd7d730ac852b950fbf7ea8d52bd13f4559b1c88
SHA2560c66024d2bcbab2b4bd0eb35ff970768cf98343cefc89cd0aff205bc7f93627f
SHA5124b99200b19165ddc966e901d35f1377738e4d8cbc5e56f359fa64733e83942088f742cf1637931eaa7796fd01f8f329e2b351cf8bdc98b318d6646b698f5e929