Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe
-
Size
83KB
-
MD5
10645df00efccbb58cfb48d38d8c3ce8
-
SHA1
70fdb3fa56d5d9aba70e52a9984f1cae1260245c
-
SHA256
fbd72924b6a6d5d8fbf2e285082c01234c1e4c376cd653a8e168f65f39e11221
-
SHA512
96e11784c79f25c747e37fb49242a35ecb0a8ee8435d080cd01854c5a2347913cb03331e50143b93d8361f234b3cab4f2f560129994cd07dc4232e7a9acc3153
-
SSDEEP
1536:S800hhPyECSfatTtP+xq3mnaZ1NJhkXAxfqr9D+:S800hhPyECSqefS1NJhkX5hy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2444 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 lsass.exe 2604 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2068 set thread context of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2748 set thread context of 2604 2748 lsass.exe 36 -
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2560-8-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2560-5-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2560-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2560-3-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2560-39-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-49-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-50-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-51-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-52-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-53-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-54-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-55-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-56-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-57-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-58-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-59-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-60-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-61-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-62-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-63-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-64-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 2604 lsass.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2560 2068 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2444 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 33 PID 2560 wrote to memory of 2444 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 33 PID 2560 wrote to memory of 2444 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 33 PID 2560 wrote to memory of 2444 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 33 PID 2560 wrote to memory of 2748 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 35 PID 2560 wrote to memory of 2748 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 35 PID 2560 wrote to memory of 2748 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 35 PID 2560 wrote to memory of 2748 2560 10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe 35 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36 PID 2748 wrote to memory of 2604 2748 lsass.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\lsass.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\10645df00efccbb58cfb48d38d8c3ce8_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\lsass.exeC:\Users\Admin\AppData\Roaming\lsass.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5269f475b67cca2a7266bb307c445ea1d
SHA106fa1c199cdbb10ae4e9cfeab7d1dac5a8823660
SHA256104b4b3c8931b2aaff1175e7b31e663f5e42cb7c0bd174275463a10c7b694b5a
SHA512dacad44e86e17e6547bc42f2a6b04c303b93d1c8dc930b3019dff47d53388887930ef4247461cbf23c6d1d0686584e6602d1cbfa8bfb4b48dfa8552549e0c795