Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe
-
Size
41KB
-
MD5
53a0bb8e788ef8b90c15929e558eda26
-
SHA1
af20794e1a444eaa7c4b62806d21b6e4e586433f
-
SHA256
986a8eeb25f179b162606a52852353d07dcd6cc0c7098f76100102cc2ff7666b
-
SHA512
fd29c6a5cafb04c566bb42829e889de57adf437afeac41b9257ff99923e274651f86b1f9f8ff9e7fc48cff1393a58e1a4ff6aa980412ac2f85a1c0d0b9a539c0
-
SSDEEP
768:oJDzG0cBgJk3R/28mbRkJJ4G1o7CeaZw/PRZCDGfIk4K:opG0cDR/5HXZw/pZCDGALK
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\Microsoft-Driver-1-52-3465-8637-4525\winrsvn.exe = "C:\\Users\\Admin\\Microsoft-Driver-1-52-3465-8637-4525\\winrsvn.exe:*:Enabled:Microsoft(R) SRDSVC Driver" 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2504 winrsvn.exe 2872 winrsvn.exe -
Loads dropped DLL 3 IoCs
pid Process 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 2504 winrsvn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft(R) SRDSVC Driver = "C:\\Users\\Admin\\Microsoft-Driver-1-52-3465-8637-4525\\winrsvn.exe" 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1720 set thread context of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 2504 set thread context of 2872 2504 winrsvn.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winrsvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2100 1720 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2504 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2504 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2504 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2504 2100 53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe 31 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32 PID 2504 wrote to memory of 2872 2504 winrsvn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53a0bb8e788ef8b90c15929e558eda26_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\Microsoft-Driver-1-52-3465-8637-4525\winrsvn.exe"C:\Users\Admin\Microsoft-Driver-1-52-3465-8637-4525\winrsvn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\Microsoft-Driver-1-52-3465-8637-4525\winrsvn.exe"C:\Users\Admin\Microsoft-Driver-1-52-3465-8637-4525\winrsvn.exe"4⤵
- Executes dropped EXE
PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD553a0bb8e788ef8b90c15929e558eda26
SHA1af20794e1a444eaa7c4b62806d21b6e4e586433f
SHA256986a8eeb25f179b162606a52852353d07dcd6cc0c7098f76100102cc2ff7666b
SHA512fd29c6a5cafb04c566bb42829e889de57adf437afeac41b9257ff99923e274651f86b1f9f8ff9e7fc48cff1393a58e1a4ff6aa980412ac2f85a1c0d0b9a539c0