Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
1a43210f401834932b515731deb398f9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1a43210f401834932b515731deb398f9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1a43210f401834932b515731deb398f9_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
1a43210f401834932b515731deb398f9
-
SHA1
22820a8fefa82a6a52004522027067c5a98457f7
-
SHA256
f76c7db479887e9ed2185329fa5724f1dad254c88d3553f413dba0d2a920ad3c
-
SHA512
9b6db7e0102d1aa526ab375edcdab0e4348f664e268b522f7d928ac70d1593e25784ea3dbfaeb08b893e7142657f29eaa6baa4980125cf08d20d0da4e8b4dbb1
-
SSDEEP
24576:UgjUgmqZ5n6tkjR26s2ZKTWm9cwfThY5HW5F2vvRef1taxih1oQ:ljU1q6ta2IWWmuMTeHW74vRm6Q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
675.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 675.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
675.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 675.exe -
Executes dropped EXE 2 IoCs
Processes:
675.exemsdcsc.exepid process 4872 675.exe 4788 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
675.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 675.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 4788 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
675.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 4872 675.exe Token: SeSecurityPrivilege 4872 675.exe Token: SeTakeOwnershipPrivilege 4872 675.exe Token: SeLoadDriverPrivilege 4872 675.exe Token: SeSystemProfilePrivilege 4872 675.exe Token: SeSystemtimePrivilege 4872 675.exe Token: SeProfSingleProcessPrivilege 4872 675.exe Token: SeIncBasePriorityPrivilege 4872 675.exe Token: SeCreatePagefilePrivilege 4872 675.exe Token: SeBackupPrivilege 4872 675.exe Token: SeRestorePrivilege 4872 675.exe Token: SeShutdownPrivilege 4872 675.exe Token: SeDebugPrivilege 4872 675.exe Token: SeSystemEnvironmentPrivilege 4872 675.exe Token: SeChangeNotifyPrivilege 4872 675.exe Token: SeRemoteShutdownPrivilege 4872 675.exe Token: SeUndockPrivilege 4872 675.exe Token: SeManageVolumePrivilege 4872 675.exe Token: SeImpersonatePrivilege 4872 675.exe Token: SeCreateGlobalPrivilege 4872 675.exe Token: 33 4872 675.exe Token: 34 4872 675.exe Token: 35 4872 675.exe Token: 36 4872 675.exe Token: SeIncreaseQuotaPrivilege 4788 msdcsc.exe Token: SeSecurityPrivilege 4788 msdcsc.exe Token: SeTakeOwnershipPrivilege 4788 msdcsc.exe Token: SeLoadDriverPrivilege 4788 msdcsc.exe Token: SeSystemProfilePrivilege 4788 msdcsc.exe Token: SeSystemtimePrivilege 4788 msdcsc.exe Token: SeProfSingleProcessPrivilege 4788 msdcsc.exe Token: SeIncBasePriorityPrivilege 4788 msdcsc.exe Token: SeCreatePagefilePrivilege 4788 msdcsc.exe Token: SeBackupPrivilege 4788 msdcsc.exe Token: SeRestorePrivilege 4788 msdcsc.exe Token: SeShutdownPrivilege 4788 msdcsc.exe Token: SeDebugPrivilege 4788 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4788 msdcsc.exe Token: SeChangeNotifyPrivilege 4788 msdcsc.exe Token: SeRemoteShutdownPrivilege 4788 msdcsc.exe Token: SeUndockPrivilege 4788 msdcsc.exe Token: SeManageVolumePrivilege 4788 msdcsc.exe Token: SeImpersonatePrivilege 4788 msdcsc.exe Token: SeCreateGlobalPrivilege 4788 msdcsc.exe Token: 33 4788 msdcsc.exe Token: 34 4788 msdcsc.exe Token: 35 4788 msdcsc.exe Token: 36 4788 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 4788 msdcsc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1a43210f401834932b515731deb398f9_JaffaCakes118.exe675.exemsdcsc.exedescription pid process target process PID 4884 wrote to memory of 4872 4884 1a43210f401834932b515731deb398f9_JaffaCakes118.exe 675.exe PID 4884 wrote to memory of 4872 4884 1a43210f401834932b515731deb398f9_JaffaCakes118.exe 675.exe PID 4884 wrote to memory of 4872 4884 1a43210f401834932b515731deb398f9_JaffaCakes118.exe 675.exe PID 4872 wrote to memory of 4788 4872 675.exe msdcsc.exe PID 4872 wrote to memory of 4788 4872 675.exe msdcsc.exe PID 4872 wrote to memory of 4788 4872 675.exe msdcsc.exe PID 4788 wrote to memory of 3408 4788 msdcsc.exe iexplore.exe PID 4788 wrote to memory of 3408 4788 msdcsc.exe iexplore.exe PID 4788 wrote to memory of 3408 4788 msdcsc.exe iexplore.exe PID 4788 wrote to memory of 900 4788 msdcsc.exe explorer.exe PID 4788 wrote to memory of 900 4788 msdcsc.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a43210f401834932b515731deb398f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a43210f401834932b515731deb398f9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\675.exeC:\Users\Admin\AppData\Local\Temp\675.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\675.exeFilesize
848KB
MD5c3117f0ae622f67dc68c178ae1663a8c
SHA17160e08fca4f08d426437589bc9ce571a575606b
SHA2563e47503c31311544f1a78a19bae880909138eea6459a40532674bde19130c448
SHA5122c32cfd7b4a7b2a3c525501bac302eab3b449a46c38b4dd658fb8281efbc8222fc8691911860a0a54cabbedb20f0ea027e6452d26ea6c5dc5ad9c720f2b9183c
-
memory/4788-35-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-34-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-28-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-40-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-29-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-38-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-37-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-36-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-33-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-27-0x00000000021B0000-0x00000000021B1000-memory.dmpFilesize
4KB
-
memory/4788-41-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-39-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-32-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-31-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4788-30-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4872-26-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/4872-14-0x00000000022E0000-0x00000000022E1000-memory.dmpFilesize
4KB
-
memory/4884-2-0x000000001B7C0000-0x000000001BC8E000-memory.dmpFilesize
4.8MB
-
memory/4884-0-0x00007FFAC12F5000-0x00007FFAC12F6000-memory.dmpFilesize
4KB
-
memory/4884-13-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmpFilesize
9.6MB
-
memory/4884-15-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmpFilesize
9.6MB
-
memory/4884-1-0x00007FFAC1040000-0x00007FFAC19E1000-memory.dmpFilesize
9.6MB
-
memory/4884-4-0x000000001B1E0000-0x000000001B286000-memory.dmpFilesize
664KB
-
memory/4884-3-0x000000001BC90000-0x000000001BECE000-memory.dmpFilesize
2.2MB