Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
ecf7e1dba888e815ec3b2a05dc2a4b13
-
SHA1
cc68c2eed09f46ddf19e42ba4160dd14cf0c3949
-
SHA256
6226b37a948914ea8bdfb9e8a1d35e26349ba1be6809ece009584a5627f52188
-
SHA512
df839884a0ceda1feeeb1de6848a1eb620142e85c9804ce531ed156da530d8000fd9f5c481657aaceae334f85f1ecb3984574f644d52e7834d2065824e1dc48c
-
SSDEEP
24576:FBJkmZYyxZvX9WFypOpcDnuWa9aktyqNQKe5GKrLr:amZYoZVIpckaktDQOK3
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2472 powershell.exe 2620 powershell.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe Token: SeDebugPrivilege 268 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2472 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2472 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2472 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2472 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2620 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2620 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2620 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2620 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2644 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2644 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2644 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2644 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 34 PID 2728 wrote to memory of 268 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 37 PID 2728 wrote to memory of 268 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 37 PID 2728 wrote to memory of 268 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 37 PID 2728 wrote to memory of 268 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 37 PID 2728 wrote to memory of 672 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 38 PID 2728 wrote to memory of 672 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 38 PID 2728 wrote to memory of 672 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 38 PID 2728 wrote to memory of 672 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 38 PID 2728 wrote to memory of 808 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 40 PID 2728 wrote to memory of 808 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 40 PID 2728 wrote to memory of 808 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 40 PID 2728 wrote to memory of 808 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 40 PID 2728 wrote to memory of 2876 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 41 PID 2728 wrote to memory of 2876 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 41 PID 2728 wrote to memory of 2876 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 41 PID 2728 wrote to memory of 2876 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 41 PID 2728 wrote to memory of 1624 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 42 PID 2728 wrote to memory of 1624 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 42 PID 2728 wrote to memory of 1624 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 42 PID 2728 wrote to memory of 1624 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 42 PID 2728 wrote to memory of 748 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 43 PID 2728 wrote to memory of 748 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 43 PID 2728 wrote to memory of 748 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 43 PID 2728 wrote to memory of 748 2728 ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uhYLboPPS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uhYLboPPS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE965.tmp"2⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uhYLboPPS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecf7e1dba888e815ec3b2a05dc2a4b13_JaffaCakes118.exe"2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e28e9f3eb87b67a01f3734d910c5b089
SHA1c4bd9e81de3f9478370b229a98ddc2f4114a9009
SHA256d473256cc54bbb06d44b5ec471a10636eb5fca1a7595ab3d34e5731901864fdd
SHA512dc1d9f17d522e90673b1adff90861775bd8500a936de0a7604d9fb00d055c934c8ba08e3b43717af737b0c2202e7dc77622eac445eb023a5d15e297ef58576e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d76ec570cfb1c7fdd8cf7ce751342b02
SHA1b8cd9ba08143fd1312c8235199eae722c16cc5d5
SHA25610d4483b8c844f3670a1601caa48539c5c45599b4b4e18de8eb8d0690df496eb
SHA51279f6f357561d7e1534b2bc6d862c0801943e1995a820e4dd11f59323613da23fb9bedc91aade63e7ea0462a27e0076485472b65a4c894f16669988b1923895ef