Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe
-
Size
840KB
-
MD5
4d9cc610b320ba38be66f36c55a9a771
-
SHA1
2f399ad060bdaeabd2bd62c87aaec35dfafcfec3
-
SHA256
15656bffba0e2814b2c1ac576f7b8c5641ca19f640251b249983b72eafe51f5f
-
SHA512
f85388ca9a7bea96fc4cac7cd26201c9970de7e98f9ccf464bc1c27eb65a45b541e9077826b13a9b274fb2ec8f4089c1c640686ae9cec549d5f39caf85352d97
-
SSDEEP
12288:L////czfa1FLFhPI8woWYXnPlVql5ciJ4FCzB+ZqlV2UQQA8j:L////cba1FrPVw6RinBeKV2UQQA8j
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
svchsot.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svchsot.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchsot.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" svchsot.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
Processes:
FdcKJU.exesvchsot.exepid Process 2864 FdcKJU.exe 2964 svchsot.exe -
Loads dropped DLL 3 IoCs
Processes:
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exepid Process 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FdcKJU.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\javaw.exe" FdcKJU.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exesvchsot.exedescription pid Process procid_target PID 2164 set thread context of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2964 set thread context of 2120 2964 svchsot.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FdcKJU.exesvchsot.exe4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.execsc.execvtres.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FdcKJU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchsot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exesvchsot.exedescription pid Process Token: SeDebugPrivilege 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2964 svchsot.exe Token: SeSecurityPrivilege 2964 svchsot.exe Token: SeTakeOwnershipPrivilege 2964 svchsot.exe Token: SeLoadDriverPrivilege 2964 svchsot.exe Token: SeSystemProfilePrivilege 2964 svchsot.exe Token: SeSystemtimePrivilege 2964 svchsot.exe Token: SeProfSingleProcessPrivilege 2964 svchsot.exe Token: SeIncBasePriorityPrivilege 2964 svchsot.exe Token: SeCreatePagefilePrivilege 2964 svchsot.exe Token: SeBackupPrivilege 2964 svchsot.exe Token: SeRestorePrivilege 2964 svchsot.exe Token: SeShutdownPrivilege 2964 svchsot.exe Token: SeDebugPrivilege 2964 svchsot.exe Token: SeSystemEnvironmentPrivilege 2964 svchsot.exe Token: SeChangeNotifyPrivilege 2964 svchsot.exe Token: SeRemoteShutdownPrivilege 2964 svchsot.exe Token: SeUndockPrivilege 2964 svchsot.exe Token: SeManageVolumePrivilege 2964 svchsot.exe Token: SeImpersonatePrivilege 2964 svchsot.exe Token: SeCreateGlobalPrivilege 2964 svchsot.exe Token: 33 2964 svchsot.exe Token: 34 2964 svchsot.exe Token: 35 2964 svchsot.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.execsc.exesvchsot.exedescription pid Process procid_target PID 2164 wrote to memory of 2588 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 29 PID 2164 wrote to memory of 2588 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 29 PID 2164 wrote to memory of 2588 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 29 PID 2164 wrote to memory of 2588 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 29 PID 2588 wrote to memory of 2972 2588 csc.exe 31 PID 2588 wrote to memory of 2972 2588 csc.exe 31 PID 2588 wrote to memory of 2972 2588 csc.exe 31 PID 2588 wrote to memory of 2972 2588 csc.exe 31 PID 2164 wrote to memory of 2864 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2864 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2864 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2864 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2164 wrote to memory of 2964 2164 4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe 33 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34 PID 2964 wrote to memory of 2120 2964 svchsot.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kero8l9m.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF44F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF44E.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\FdcKJU.exe"C:\Users\Admin\AppData\Local\Temp\FdcKJU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\svchsot.exeC:\Users\Admin\AppData\Local\Temp\svchsot.exe2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:2120
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e70e37a9a9fdb1029c8d5bcfb595fc29
SHA1115076f4dcd592ebca07cf6df42e8a13a1f2c0f8
SHA256af2d3d47b4673ec8d5e8322277b0c44fdb994bd87f8db4377bb8b814deaa650e
SHA512257a6bc7f415867201c7c7609fba495935495276afe5607ee491feecdb9caca0867e24bbdca41d9b028671e5490c85c475e187e00f0f8d09fb5ee8878507e97f
-
Filesize
1KB
MD5d3dea9261f6785d2e4d0e186859f289f
SHA168daf80abedf60ad586aef0784975d613e2b50c3
SHA2561db433029e57c6db717de41117a96e569e4ef2a23e7397fc5d437d2b92557be0
SHA51201b1d1aadc0b04184489a694c15495aa27aeec1f9d77e8dc498724127691112e67c8897f3aac7a876ad46fbb5ed919899d6c4043f3401087c81b0247eecd283c
-
Filesize
644B
MD52c9c27e24f3f0397b2524d174acf6446
SHA14fe4388d76fbb30f1861e8bd4f0314898e878c2b
SHA256360319079e102fd47bc7e6f87189b11567524cb6501b41c16cae6acbcb6ca7b6
SHA512e8bbde09e515a4f7ffedaaa840a99e0622e8ae90793f35700e450992cd63c7c65cce45d43b6330bd19910634f78b8510667748ca18489bb2d52c9b11647cbb00
-
Filesize
1KB
MD52213239e80e871f9ac49de583c363317
SHA1488858c268a52e504b7eb08fa7ed32994b41c2c5
SHA2565ae20ce7a86efecea947802d1098f7a958d0f02d0760dbd850fe8309c6487bc0
SHA5121b4dd80972b0ba1edc406a494760d182b58c65dfaaa0036b1b8878a9efe49021bd5145bd0de4753256a4735825f8c2d80c071ff5230a181cfe91855e31610997
-
Filesize
259B
MD54badeca2ccd5d876c0f92d2e4248d099
SHA16b7584104e16bdfb2c78f2ea662b84ca3d73b172
SHA2564efe9ab4812e33d255ad931f42579161b1780b772c6dbb8053d6463011f795bf
SHA5128a2c7ce85e4220b647f19cf4d965874af8266f7f69cd74b909b12751f3272467ac09c39e288765d697313ef5a6b47faa814ecafc0eeac2580fd5a4fbc1c2e1f5
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2