Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe
-
Size
355KB
-
MD5
e8d525d0a2bf8e47436238b52884d8b6
-
SHA1
db66207de2e31ba6e5fd7f1ffbc8f2b8ba8d3873
-
SHA256
c49d1a79cc30af3de957e4e5f6ae249e074dd85d3200868e36f14d97144cebb7
-
SHA512
cdaca2fc83af3ed9710f8d37397258d60c135d4e2a526a1565d2d06c65473f4c7091d5c6476339eef3137995fda6244f8499f8edf772548f1171e8dc8d81d659
-
SSDEEP
6144:L3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:omWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3424 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a00ec624 = "Ac7Ž:\u008d\x7fä^\u008f\u008f\x02ƒÓ|¯\x1aý¹\x05¤]w\x12¶5o¯,ÃŽÓ©\x12£k!;œŒaNRj¬Ëš«Ñ‘'®‰ƒ\x1bj«áÁ\x1e3£‘7C~\x17|I·œA©´\v\x0e;¿×΃3éÛôÛËÿa\x12nþ÷iÂéñ\v‰³¤,Ú\x11Ò¶O\x19\x01KCë†s:¹Ñ±‹’.\"\x03F{\tJ71¢±D/\x19«âþ™»á\x16ï<§$&º«ª*»|\x1c‡«\aZùû\x1f\fŸ÷»¯\x06)I\x1bÇ›ñÁY¹Á†{\x11\u008f™\x1e‘ײæ\t\u008f)™’Á¾”¬{\x13\x7fªö™\x17<1\\éÎ\x03²\x03C6IÞên\x13¹îvfj\\ïùü4‡ÛÎÉ\"\x0eŽËò–‹úGd{¡ñæ|Ar¡\x11Ú\\Q\x11$\x13|\x14,#" e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a00ec624 = "Ac7Ž:\u008d\x7fä^\u008f\u008f\x02ƒÓ|¯\x1aý¹\x05¤]w\x12¶5o¯,ÃŽÓ©\x12£k!;œŒaNRj¬Ëš«Ñ‘'®‰ƒ\x1bj«áÁ\x1e3£‘7C~\x17|I·œA©´\v\x0e;¿×΃3éÛôÛËÿa\x12nþ÷iÂéñ\v‰³¤,Ú\x11Ò¶O\x19\x01KCë†s:¹Ñ±‹’.\"\x03F{\tJ71¢±D/\x19«âþ™»á\x16ï<§$&º«ª*»|\x1c‡«\aZùû\x1f\fŸ÷»¯\x06)I\x1bÇ›ñÁY¹Á†{\x11\u008f™\x1e‘ײæ\t\u008f)™’Á¾”¬{\x13\x7fªö™\x17<1\\éÎ\x03²\x03C6IÞên\x13¹îvfj\\ïùü4‡ÛÎÉ\"\x0eŽËò–‹úGd{¡ñæ|Ar¡\x11Ú\\Q\x11$\x13|\x14,#" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe 3424 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3424 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 85 PID 2420 wrote to memory of 3424 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 85 PID 2420 wrote to memory of 3424 2420 e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8d525d0a2bf8e47436238b52884d8b6_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5d2c1e01ba6f3493607dfdf984793805b
SHA1d862dfaff98ddbf4d40aac45f25af81582c257d0
SHA256f73e279960f5759c75f9a74c70d22aad9e3e7a9315ea421630bf96a206bded2c
SHA512bbcd5f4d68de7cbc9ccce241cb4a693cc73af9f770929e1870e87e68347c18562419c4d7a72dbc200ffc62fc5b4eb0ab45215acbc7b33cb2558e0a7f850ac198
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
23KB
MD5c3f5b5e191983a3f6b5893e398fe353d
SHA14716f9ec41523e77894ba82f3a6591a872021da0
SHA2561a27e12bf762c6bab32ea43d64b75c8cf93099ff9ae5a2331c0cf20e03f7fb70
SHA51245d339cb40d5456ce6184d95c00428a7c82696f7f19f089d72a1f77a30eed9d29f16c923cb66c5250e9dac3c9f5e11c80df20c0055ed004318c656b2b5d80073
-
Filesize
1KB
MD5013491e66d1abec60d51a3b72a17955e
SHA1db037b281db5b3c27aa96fe2f6e8cc72ce8dd6e8
SHA2564060a8ffbbdea064ffee3955279da74a096f7e7e1d50ba4eb9ef9fa3572a42f7
SHA512c1be0ac854875c0197fd5cc63a227c87db7fccd1f2a128b635d30a971d41fac61622142e7892d27cd979f2f9059df9a4eb77b1b5c815337312e3717f9c0e6ca4
-
Filesize
355KB
MD558ba1bf727f31a201e592b10a4f5e3d3
SHA1ad736fcb2181181b9f6211d1b4857336767ddf6b
SHA2562896e9d63132f49c7ff5c797429f7f01b942cce8bec08eaac95c57985ebe4d71
SHA51283f378f1a0cfdca10b3db7a35f1d67dd255bab5e484cb15667994a770cdc0215ee627bb5281ba79e69673b915a28c0d56f7af7db1e16b031188671b7bae06bf7