Analysis
-
max time kernel
153s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe
-
Size
129KB
-
MD5
fe90d5dfa60dad355df93bd04bf6fa50
-
SHA1
c52a3f8818598932bb70916d7b9af3f10e2f2e08
-
SHA256
d646ecf9a3129198c6b1d832518fce34e093851c21e32c99353779c428da3833
-
SHA512
e635d45bb07311fcce15f60c7fdb77478b1cdf4af500d73379d2430a8a06d07432cb23b651bff5527a2b0abffe9046f2d67a726f841be99be36566bbd65aa5bf
-
SSDEEP
1536:dgb+dHlIFvviUq2VXtxOowiVdIyk4Xys4GTNKan4bFpb251VrGrT86Swnmio3+j4:BdSBv1xRIyk/ANK8IJ86QxoI/
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe:*:Enabled:Java Updater" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 4564 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java Updater = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe 4564 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4564 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 4564 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.execmd.execmd.execmd.exedescription pid process target process PID 3176 wrote to memory of 3980 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 3980 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 3980 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 1412 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 1412 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 1412 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 884 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 884 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 3176 wrote to memory of 884 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe cmd.exe PID 1412 wrote to memory of 3340 1412 cmd.exe reg.exe PID 1412 wrote to memory of 3340 1412 cmd.exe reg.exe PID 1412 wrote to memory of 3340 1412 cmd.exe reg.exe PID 3980 wrote to memory of 220 3980 cmd.exe reg.exe PID 3980 wrote to memory of 220 3980 cmd.exe reg.exe PID 3980 wrote to memory of 220 3980 cmd.exe reg.exe PID 884 wrote to memory of 788 884 cmd.exe reg.exe PID 884 wrote to memory of 788 884 cmd.exe reg.exe PID 884 wrote to memory of 788 884 cmd.exe reg.exe PID 3176 wrote to memory of 4564 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe PID 3176 wrote to memory of 4564 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe PID 3176 wrote to memory of 4564 3176 fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe90d5dfa60dad355df93bd04bf6fa50_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v "FirewallDisableNotify" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v "FirewallDisableNotify" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Java Updater" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Java Updater" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\explorer.exeFilesize
129KB
MD5fe90d5dfa60dad355df93bd04bf6fa50
SHA1c52a3f8818598932bb70916d7b9af3f10e2f2e08
SHA256d646ecf9a3129198c6b1d832518fce34e093851c21e32c99353779c428da3833
SHA512e635d45bb07311fcce15f60c7fdb77478b1cdf4af500d73379d2430a8a06d07432cb23b651bff5527a2b0abffe9046f2d67a726f841be99be36566bbd65aa5bf
-
memory/3176-0-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/3176-1-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/3176-2-0x0000000000C50000-0x0000000000C60000-memory.dmpFilesize
64KB
-
memory/3176-20-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/4564-16-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/4564-18-0x00000000015E0000-0x00000000015F0000-memory.dmpFilesize
64KB
-
memory/4564-19-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/4564-21-0x00000000015E0000-0x00000000015F0000-memory.dmpFilesize
64KB
-
memory/4564-22-0x0000000074710000-0x0000000074CC1000-memory.dmpFilesize
5.7MB
-
memory/4564-23-0x00000000015E0000-0x00000000015F0000-memory.dmpFilesize
64KB