Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe
-
Size
355KB
-
MD5
f091715f041f72497b23d1f9d66e643f
-
SHA1
54d4981feda40d38e730e0afa56160ab0d1809d7
-
SHA256
b8efa8d1ada1cc82111e3623571fb53ddf709977c9c4c4773aeea323f4134676
-
SHA512
fa179c24e2b6bd49374a28561424e2176a1e87317bbf10e723458791383454b773ec60586632b143d5169a14d1cb62f2bdfefe2db8478841e76e7e69945ecae0
-
SSDEEP
6144:03EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:/mWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e0363cb4 = "B‹á‚g?1–>’)Ô\x06‘]\x18%²Eéí‡\x06|ãN°wF•`f«ÎmUmé¬\u00adnyáuÿm\x1cÇÛÞé¥\x01¹5¹\u00adËNî“Ý\x05$Ñ”ù®ÿžÑ„q䣴aQ5½…³Y]{\x01_q\u009d\x1ce^m³V])YÉ&·\x0e\x1cÖ\u0081|m{“\x1dçt×üííG\x13\x7fuFôõ<\x15U´\x1d\x19…œŽ\x15Ì\x19\u008dÑyÙ廣!m¡\u0081\u009d\x033Å…¥M\x05—Iaeé‰f\tî!ñÇÉ””õÏÍ4\x19™£1ñI³\u008f\x1dl-Ã%iyU6>1Åc¦]\x11MÄ×ý\r[q\a³\x16_\x0f9-\rË¡A\x14\x13Œ_UFÓ]÷ü™\u009dÑTeÅ¡1Á\u00adU\rÇ\x1f¶\x0ek\u008f\x19\u0081%ý\x1d,«u.É\x15ŸM\rÝ]" f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e0363cb4 = "B‹á‚g?1–>’)Ô\x06‘]\x18%²Eéí‡\x06|ãN°wF•`f«ÎmUmé¬\u00adnyáuÿm\x1cÇÛÞé¥\x01¹5¹\u00adËNî“Ý\x05$Ñ”ù®ÿžÑ„q䣴aQ5½…³Y]{\x01_q\u009d\x1ce^m³V])YÉ&·\x0e\x1cÖ\u0081|m{“\x1dçt×üííG\x13\x7fuFôõ<\x15U´\x1d\x19…œŽ\x15Ì\x19\u008dÑyÙ廣!m¡\u0081\u009d\x033Å…¥M\x05—Iaeé‰f\tî!ñÇÉ””õÏÍ4\x19™£1ñI³\u008f\x1dl-Ã%iyU6>1Åc¦]\x11MÄ×ý\r[q\a³\x16_\x0f9-\rË¡A\x14\x13Œ_UFÓ]÷ü™\u009dÑTeÅ¡1Á\u00adU\rÇ\x1f¶\x0ek\u008f\x19\u0081%ý\x1d,«u.É\x15ŸM\rÝ]" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe 2648 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 2648 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 84 PID 228 wrote to memory of 2648 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 84 PID 228 wrote to memory of 2648 228 f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD565d65d06231ebbc742378d2eb715e403
SHA1701782e7fe3ce4f6049009679558be571d33d23b
SHA2560dafc6491d0779edd55149322b508a0be5fb16217f15e764f0e2cc2820bd803b
SHA5120f7dd58eb525437f595e3e4f0e0e8c565db2cab3815604cc3b80ae2d90dbb6ac6fdf732c10defee465a3a96b74fedc2658c22760309eefce7f37a1915dd26e6a
-
Filesize
42KB
MD51b66f2caae2974046fbe430c5841f5cf
SHA1095665890d30839792b8acf6db8e2a8fb8afdf85
SHA256e521403abd37e9a2f949e166e24cdbb8c77fcf52b4bfee23a2f6502d455d546c
SHA51213effa150d41d28d052f096dc5e994dd31eadc66a89368224221ed13813d777148d5f4c7c02b960c5eb8cb3977d06ac658b50d2ced7356443e4732c22e3ec1a6
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
355KB
MD5d96b5def8a2f5899a43910fe987985bf
SHA19e223298e9230ac9d226eeda6c6d5d810a687c36
SHA2562b0a3d19637cccba6b6e8651e7af31537aeb8685d527b096882b5cb2da9eb74d
SHA51269d76a2e7fd079a80438e897cadcf35fb1806510ec93b6c6aebc6b6800862de7f83b079a274226f4f0ae4da3cef07b405f3d52363b6e53eeaffd5250221d4166