Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe
-
Size
440KB
-
MD5
ff38fb89c4a9826d259d62c659caf13a
-
SHA1
476261ad1e841e211f6ae7d5b32eb961a8ebb701
-
SHA256
dc712109e28e6135df55071d9b83127fdf6b946c0ec99d48cfcf723c9ba9ebcd
-
SHA512
7e35455014c212fed72bbcf28f0a8f208361300d4a213aab4f05f226c6117c2be8fab10ef0e05b20894148b5e9ba7040668b17af73ac9e166d8a6d1f4f49eb38
-
SSDEEP
6144:K9qROWGtGSJLg/Ud0QjyIb7V6onNXmHIBGIwkmBbGzqSdlVVngwYcV9U:DROzk0Md1Y2oNwkmozqSdDVngx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
zJCkey1qjz7hKs.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" zJCkey1qjz7hKs.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
zJCkey1qjz7hKs.exeexplorer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate zJCkey1qjz7hKs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
zJCkey1qjz7hKs.exepid Process 4608 zJCkey1qjz7hKs.exe -
Processes:
resource yara_rule behavioral2/files/0x00070000000233e9-10.dat upx behavioral2/memory/4608-14-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-20-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-22-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/4608-23-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-24-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-26-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-25-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-27-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-29-0x0000000000400000-0x00000000004E5000-memory.dmp upx behavioral2/memory/2488-30-0x0000000000400000-0x00000000004E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
zJCkey1qjz7hKs.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" zJCkey1qjz7hKs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zJCkey1qjz7hKs.exedescription pid Process procid_target PID 4608 set thread context of 2488 4608 zJCkey1qjz7hKs.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
zJCkey1qjz7hKs.exeexplorer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier zJCkey1qjz7hKs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zJCkey1qjz7hKs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zJCkey1qjz7hKs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zJCkey1qjz7hKs.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
zJCkey1qjz7hKs.exeexplorer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier zJCkey1qjz7hKs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exezJCkey1qjz7hKs.exeexplorer.exedescription pid Process Token: SeDebugPrivilege 1204 ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeSecurityPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeTakeOwnershipPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeLoadDriverPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeSystemProfilePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeSystemtimePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeProfSingleProcessPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeIncBasePriorityPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeCreatePagefilePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeBackupPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeRestorePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeShutdownPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeDebugPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeSystemEnvironmentPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeChangeNotifyPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeRemoteShutdownPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeUndockPrivilege 4608 zJCkey1qjz7hKs.exe Token: SeManageVolumePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeImpersonatePrivilege 4608 zJCkey1qjz7hKs.exe Token: SeCreateGlobalPrivilege 4608 zJCkey1qjz7hKs.exe Token: 33 4608 zJCkey1qjz7hKs.exe Token: 34 4608 zJCkey1qjz7hKs.exe Token: 35 4608 zJCkey1qjz7hKs.exe Token: 36 4608 zJCkey1qjz7hKs.exe Token: SeIncreaseQuotaPrivilege 2488 explorer.exe Token: SeSecurityPrivilege 2488 explorer.exe Token: SeTakeOwnershipPrivilege 2488 explorer.exe Token: SeLoadDriverPrivilege 2488 explorer.exe Token: SeSystemProfilePrivilege 2488 explorer.exe Token: SeSystemtimePrivilege 2488 explorer.exe Token: SeProfSingleProcessPrivilege 2488 explorer.exe Token: SeIncBasePriorityPrivilege 2488 explorer.exe Token: SeCreatePagefilePrivilege 2488 explorer.exe Token: SeBackupPrivilege 2488 explorer.exe Token: SeRestorePrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeDebugPrivilege 2488 explorer.exe Token: SeSystemEnvironmentPrivilege 2488 explorer.exe Token: SeChangeNotifyPrivilege 2488 explorer.exe Token: SeRemoteShutdownPrivilege 2488 explorer.exe Token: SeUndockPrivilege 2488 explorer.exe Token: SeManageVolumePrivilege 2488 explorer.exe Token: SeImpersonatePrivilege 2488 explorer.exe Token: SeCreateGlobalPrivilege 2488 explorer.exe Token: 33 2488 explorer.exe Token: 34 2488 explorer.exe Token: 35 2488 explorer.exe Token: 36 2488 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exezJCkey1qjz7hKs.exedescription pid Process procid_target PID 1204 wrote to memory of 4608 1204 ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe 94 PID 1204 wrote to memory of 4608 1204 ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe 94 PID 1204 wrote to memory of 4608 1204 ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe 94 PID 4608 wrote to memory of 2488 4608 zJCkey1qjz7hKs.exe 95 PID 4608 wrote to memory of 2488 4608 zJCkey1qjz7hKs.exe 95 PID 4608 wrote to memory of 2488 4608 zJCkey1qjz7hKs.exe 95 PID 4608 wrote to memory of 2488 4608 zJCkey1qjz7hKs.exe 95 PID 4608 wrote to memory of 2488 4608 zJCkey1qjz7hKs.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff38fb89c4a9826d259d62c659caf13a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\zJCkey1qjz7hKs.exe"C:\Users\Admin\AppData\Local\Temp\zJCkey1qjz7hKs.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD5e97801072b7168ab6d2f3cfc685fbfc5
SHA15523677488c1aaf3e140dd654ec09d0c7cca574d
SHA2569eaab3604ba8e7203e2e764a7b29f3ff94be723a8f66579c9357bf6207537010
SHA51207e702fd1659cb5dd8c64901eda078caf1644c9b341d3acade72a90de319c485511f03b2c917d4095083381177d6d0d3dc4be33607412674218d2312801862fc