Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:18
Behavioral task
behavioral1
Sample
JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe
-
Size
471KB
-
MD5
632c6d7f9755f7f9acbe496b837772af
-
SHA1
16d7744f47c08211fb9c6f85260b88aa2eeb9b5b
-
SHA256
a30741fcc6c8493d9dc2f111219c56e656320983a8e6260084885c6acb4d6f36
-
SHA512
f9e8845aa11a7e6de27a8937cf8eeda00919ed36704c14867e7a12f35b85b756704b34ef3aac2d1eb9549d399916cfbe026096e364d17db6d415ce6e6d157c9e
-
SSDEEP
12288:331TIGB1wdj3t+7MgEo25RQu0x7Wt1tR5WGjs8:3FpHwxrg0RCxewms8
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\U1VJJM95X2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\U1VJJM95X2.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\cvtres.exe:*:Enabled:Windows Messanger" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2972 reg.exe 2680 reg.exe 2840 reg.exe 2988 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1640 cvtres.exe Token: SeCreateTokenPrivilege 1640 cvtres.exe Token: SeAssignPrimaryTokenPrivilege 1640 cvtres.exe Token: SeLockMemoryPrivilege 1640 cvtres.exe Token: SeIncreaseQuotaPrivilege 1640 cvtres.exe Token: SeMachineAccountPrivilege 1640 cvtres.exe Token: SeTcbPrivilege 1640 cvtres.exe Token: SeSecurityPrivilege 1640 cvtres.exe Token: SeTakeOwnershipPrivilege 1640 cvtres.exe Token: SeLoadDriverPrivilege 1640 cvtres.exe Token: SeSystemProfilePrivilege 1640 cvtres.exe Token: SeSystemtimePrivilege 1640 cvtres.exe Token: SeProfSingleProcessPrivilege 1640 cvtres.exe Token: SeIncBasePriorityPrivilege 1640 cvtres.exe Token: SeCreatePagefilePrivilege 1640 cvtres.exe Token: SeCreatePermanentPrivilege 1640 cvtres.exe Token: SeBackupPrivilege 1640 cvtres.exe Token: SeRestorePrivilege 1640 cvtres.exe Token: SeShutdownPrivilege 1640 cvtres.exe Token: SeDebugPrivilege 1640 cvtres.exe Token: SeAuditPrivilege 1640 cvtres.exe Token: SeSystemEnvironmentPrivilege 1640 cvtres.exe Token: SeChangeNotifyPrivilege 1640 cvtres.exe Token: SeRemoteShutdownPrivilege 1640 cvtres.exe Token: SeUndockPrivilege 1640 cvtres.exe Token: SeSyncAgentPrivilege 1640 cvtres.exe Token: SeEnableDelegationPrivilege 1640 cvtres.exe Token: SeManageVolumePrivilege 1640 cvtres.exe Token: SeImpersonatePrivilege 1640 cvtres.exe Token: SeCreateGlobalPrivilege 1640 cvtres.exe Token: 31 1640 cvtres.exe Token: 32 1640 cvtres.exe Token: 33 1640 cvtres.exe Token: 34 1640 cvtres.exe Token: 35 1640 cvtres.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1640 cvtres.exe 1640 cvtres.exe 1640 cvtres.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 2568 wrote to memory of 1640 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 30 PID 1640 wrote to memory of 1056 1640 cvtres.exe 31 PID 1640 wrote to memory of 1056 1640 cvtres.exe 31 PID 1640 wrote to memory of 1056 1640 cvtres.exe 31 PID 1640 wrote to memory of 1056 1640 cvtres.exe 31 PID 1640 wrote to memory of 2624 1640 cvtres.exe 32 PID 1640 wrote to memory of 2624 1640 cvtres.exe 32 PID 1640 wrote to memory of 2624 1640 cvtres.exe 32 PID 1640 wrote to memory of 2624 1640 cvtres.exe 32 PID 1640 wrote to memory of 2196 1640 cvtres.exe 33 PID 1640 wrote to memory of 2196 1640 cvtres.exe 33 PID 1640 wrote to memory of 2196 1640 cvtres.exe 33 PID 1640 wrote to memory of 2196 1640 cvtres.exe 33 PID 1640 wrote to memory of 2616 1640 cvtres.exe 35 PID 1640 wrote to memory of 2616 1640 cvtres.exe 35 PID 1640 wrote to memory of 2616 1640 cvtres.exe 35 PID 1640 wrote to memory of 2616 1640 cvtres.exe 35 PID 2568 wrote to memory of 2732 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 39 PID 2568 wrote to memory of 2732 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 39 PID 2568 wrote to memory of 2732 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 39 PID 2568 wrote to memory of 2732 2568 JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe 39 PID 2624 wrote to memory of 2840 2624 cmd.exe 40 PID 2624 wrote to memory of 2840 2624 cmd.exe 40 PID 2624 wrote to memory of 2840 2624 cmd.exe 40 PID 2624 wrote to memory of 2840 2624 cmd.exe 40 PID 2196 wrote to memory of 2988 2196 cmd.exe 43 PID 2196 wrote to memory of 2988 2196 cmd.exe 43 PID 2196 wrote to memory of 2988 2196 cmd.exe 43 PID 2196 wrote to memory of 2988 2196 cmd.exe 43 PID 1056 wrote to memory of 2972 1056 cmd.exe 42 PID 1056 wrote to memory of 2972 1056 cmd.exe 42 PID 1056 wrote to memory of 2972 1056 cmd.exe 42 PID 1056 wrote to memory of 2972 1056 cmd.exe 42 PID 2616 wrote to memory of 2680 2616 cmd.exe 41 PID 2616 wrote to memory of 2680 2616 cmd.exe 41 PID 2616 wrote to memory of 2680 2616 cmd.exe 41 PID 2616 wrote to memory of 2680 2616 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_632c6d7f9755f7f9acbe496b837772af.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\U1VJJM95X2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\U1VJJM95X2.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\U1VJJM95X2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\U1VJJM95X2.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2680
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\pCqvg.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD557d49c92d33173b9312decef4e9e2c8e
SHA1073bc2161cb066fb1eaaae661d0a7482c8874d95
SHA256d15813eaaaac3c8d2c899778b2ce61cbf4bb461bb0d8fbd10e946f38668bcb96
SHA512467dd9bec195d0392b3f67e3aae278d675bf163c25fb1fcdaa2b05a6539e38df406b799f44b848be9b10f36c3dc4f6806c90e381e6b18acdae59887aff687aad