Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
-
Size
416KB
-
MD5
eacfa7730063244f5b58d0de9fed2677
-
SHA1
951ffcbe94b006acf2d2c318ccaefe8859e840ed
-
SHA256
fe66d0e33ca7e11256b69698168740c284cf246675e17f93cbcf78cbb8ba3d20
-
SHA512
4ec278211c70a98eedcb7947af2de2b64d1a6cfe4a7416b013445b0cd05f46e2e87bbd8e793c2057df633dc73705de3501353d0aaa638d8901de0caed1039a96
-
SSDEEP
6144:8FXJEEL1/uM1ZBEp9RZ5b46ijbozptjdJ7QEc5Jg+FBSBNiNdSkgMpDn0:8FBRh94b4xjbozptH7QDfFsBNiNdSI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000AB27FB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000AB27FB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000AB27FB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000AB27FB4EB2331 = "C:\\ProgramData\\043A6AEB00014973000AB27FB4EB2331\\043A6AEB00014973000AB27FB4EB2331.exe" 043A6AEB00014973000AB27FB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 043A6AEB00014973000AB27FB4EB2331.exe 2760 043A6AEB00014973000AB27FB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2760 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2760 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2760 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2760 2228 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\ProgramData\043A6AEB00014973000AB27FB4EB2331\043A6AEB00014973000AB27FB4EB2331.exe"C:\ProgramData\043A6AEB00014973000AB27FB4EB2331\043A6AEB00014973000AB27FB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5eacfa7730063244f5b58d0de9fed2677
SHA1951ffcbe94b006acf2d2c318ccaefe8859e840ed
SHA256fe66d0e33ca7e11256b69698168740c284cf246675e17f93cbcf78cbb8ba3d20
SHA5124ec278211c70a98eedcb7947af2de2b64d1a6cfe4a7416b013445b0cd05f46e2e87bbd8e793c2057df633dc73705de3501353d0aaa638d8901de0caed1039a96