Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe
-
Size
239KB
-
MD5
f036b98a4a283b5c094e129dea8f2b31
-
SHA1
1f16b397bbf66698c28f2ccb568a48a13bbf6a9a
-
SHA256
43d3b62c463c79fd235624fdfc50382c0a7e034c7b7306fdf4e39472d303cbaf
-
SHA512
94daf169a405215114153f632a41aa05fbbe045fdecd979fd6ec22a9b5f13069b1cbe8446454f3947c564b3d823603e7c54f045009f13bb156b818a40aea5403
-
SSDEEP
6144:ecfqGJSFKnLQXBgBrX227mz4DgAxOvKWr8:dtJS40x0pDgAxOv/8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\F036B9~1.EXE," f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F036B9~1.EXE" f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a9414a6e = "낞\u008d#„\x14ñ\x02O¼ûéàz¡É€jø`8d®\u0081û©‚4&Û—ˆ†^˜Y\u0090 é~ã” r(#䤵؇d\x05Gš`í•é!Fêz›I\u008fx±T€ucé27Ó_Sð&´ ™”x‚ÒXá´\u0090ºŽ\u00a0¸¦HQ®±žj\x19‰¬º\u0081üô¾\x02æ>)¾$@aÉb`¬ÒR®€0ȪÊ\x1a>°ð¦ä\u00a00,\u0081$n\béœ\x11Ê©,|\x18ÞÖ4DZ\x1eX®9hùЩ(¹>J\"âZ~‚d)n.ù‚è ©X>Q¸|6øtœR¡zÈøŽ\x18¶Ú\f:\x0e2Ȫ\x18ÜnPò©¢h\x06 ŽJ‰\\˜ö1ˆh~À|¾žàrhèjÐp,ü`xQHh\"ÄÔv`\x18:~\"" f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F036B9~1.EXE" f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe Token: SeSecurityPrivilege 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe Token: SeSecurityPrivilege 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe Token: SeSecurityPrivilege 4056 f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f036b98a4a283b5c094e129dea8f2b31_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056