Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe
-
Size
7.7MB
-
MD5
10f3c423473b9194eb939f0a85cb289e
-
SHA1
c8bcc5ed1abb931477eff60ec9108dadfed41524
-
SHA256
228e62d0e6c1bbcdee50360e9eb294fa9c1638ac6d008df08e64a7d9869f3467
-
SHA512
e5ea45a7eb141b05b2383aa22c6012d285f405c3308d6e9cb962e5379fc31593f67863e7fb8bc08d4834a3c875f726a151bfc898557112ae2ae62d05e769ea34
-
SSDEEP
98304:yJDYOXwnS4rVflAIDQcvwIDQnJDYOXwnS4rVflAIDQcvwIDQnm:rIslAuQtuQKIslAuQtuQ
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2236 673.#.exe 4324 6.#.exe 4644 757.#.exe 4420 16.#.exe 4908 307.#.exe 4976 997.#.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 997.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 673.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 6.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 757.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 16.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 307.#.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\host\ 307.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\ 673.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\ 757.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ 757.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\ 757.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\ 16.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\ 757.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\ 757.#.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\ 757.#.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\ 6.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\ 16.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\ 307.#.exe File created C:\Program Files\Java\jre-1.8\bin\java.exe 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\ 757.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\ 757.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\ 673.#.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\WidevineCdm\_platform_specific\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\en-us\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\management\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\ 6.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\ 6.#.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\ 757.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 6.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\ 673.#.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\ 757.#.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\ 307.#.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\ 757.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\ 16.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\ 673.#.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 673.#.exe File opened for modification C:\Program Files\Java\ 673.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\ 757.#.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\ 6.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\ 16.#.exe File created C:\Program Files\Java\jdk-1.8\bin\javac.exe 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe 673.#.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\ 6.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\ 757.#.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\ 16.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\ 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\ 673.#.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\ 673.#.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\ 16.#.exe -
NTFS ADS 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 307.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 997.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 673.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 6.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 757.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 16.#.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1972 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe 2236 673.#.exe 4324 6.#.exe 4644 757.#.exe 4420 16.#.exe 4908 307.#.exe 4976 997.#.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2236 1972 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe 97 PID 1972 wrote to memory of 2236 1972 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe 97 PID 1972 wrote to memory of 2236 1972 10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe 97 PID 2236 wrote to memory of 4324 2236 673.#.exe 98 PID 2236 wrote to memory of 4324 2236 673.#.exe 98 PID 2236 wrote to memory of 4324 2236 673.#.exe 98 PID 4324 wrote to memory of 4644 4324 6.#.exe 101 PID 4324 wrote to memory of 4644 4324 6.#.exe 101 PID 4324 wrote to memory of 4644 4324 6.#.exe 101 PID 4644 wrote to memory of 4420 4644 757.#.exe 102 PID 4644 wrote to memory of 4420 4644 757.#.exe 102 PID 4644 wrote to memory of 4420 4644 757.#.exe 102 PID 4420 wrote to memory of 4908 4420 16.#.exe 103 PID 4420 wrote to memory of 4908 4420 16.#.exe 103 PID 4420 wrote to memory of 4908 4420 16.#.exe 103 PID 4908 wrote to memory of 4976 4908 307.#.exe 104 PID 4908 wrote to memory of 4976 4908 307.#.exe 104 PID 4908 wrote to memory of 4976 4908 307.#.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10f3c423473b9194eb939f0a85cb289e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\673.#.exeC:\Users\Admin\AppData\Local\Temp\673.#.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\6.#.exeC:\Users\Admin\AppData\Local\Temp\6.#.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\757.#.exeC:\Users\Admin\AppData\Local\Temp\757.#.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\16.#.exeC:\Users\Admin\AppData\Local\Temp\16.#.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\307.#.exeC:\Users\Admin\AppData\Local\Temp\307.#.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\997.#.exeC:\Users\Admin\AppData\Local\Temp\997.#.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.7MB
MD5240dfb5623192c64aeacab4e0a273de1
SHA1eb330fe6ad833dd4bfedb2d308a15e80b912be0f
SHA25639ce74f5a654ef84906a319a91614a8ab76f93353c931c220ee39d0a79b1b522
SHA5127f25b081ba1b139c2353bb4a88839a007ba99e0ec796134611e07c6494a9c64f48e7764c5f8b98dae4a0f9e4c3edfef720cb04b93a2e51b48835415a6162c434
-
Filesize
7.7MB
MD59096164289a3533091be41d587731ea8
SHA1ebce31f396413f0897c0ce25a95f80fb48e40273
SHA2569556612a83fb01768e00c5a8b4d5d3667fb066926b99bd16829668e3ef1b73bc
SHA5124ac22f6d08bb2baaf78091fc4b7f5f5c3a9b72d2fc8bffd53edda3bbe890608050c4ce5462c9eff531355a85e32bf745cd536fdf3aa696e4f83c502401b1cb17
-
Filesize
7.7MB
MD5101f0922f735592cd82359c948f21392
SHA1c7fdcb9ccb2935a285eb9e39c64db1b1e032d503
SHA2563b710446285bd3f1dca95a074a0230450d6e037061cc900c2d7dba3fe27abae3
SHA5120f2f48e873a58877a9ae657b493c6af3f038d1a9612cad1a66c9bf885e175f76590cfc004d83e21ff6ea25f34e12de9ec7d4e2d9e9838c2dbf783f7ee4be5760
-
Filesize
7.7MB
MD5d4a58eb5106bc3a5842a3409dac4660e
SHA132b8f588dc265ee8ca13c24cea507b7095180f38
SHA256567c3a23510b92365007fc626cd487ab7a8004d5d394f194c192a58e6f0e42de
SHA51214820cc06465f61e8693ff4b005ac19a82fdaf9e8f5605777798dd1c46d8c94926f68dfda1924e5a6f6825cf14c98c8c2d982b5ed0616b7387ab63bcfcee603f
-
Filesize
7.7MB
MD5fdf95f126ea5eb5db5b513ce4a96403c
SHA1df1c1e33ad6311e3e8842350727fcd1cce83e979
SHA256af7b2df8a7e62cff5bd84e0b80a8ba7731a5fc677655c1e75f9a7c04502fb55a
SHA512057982ba3a8a10549c5d9804a7ef5ab5b0eed4fc8be049457b6522e891d1c2de4b56a13d72814a19ecb166eb821f9e93dccdac4d1f1b9808d8f1f10261248020
-
Filesize
7.7MB
MD589ef50bc2b9e263ac9a25ea0d8e1cf5b
SHA12907193f8d8d647d4660355c37b0ad4e08f4fb9e
SHA25648d14b04fefd1bdf48e3f73dc7a044b0968826bc66f809acdd9445b81e6aa829
SHA512d920fbe93ff6216245ff99fdcc43cbc2a84345385ee1e73dafdcef3e59ce49e2557685b14120b045a96f77b0ac1af3fb31cf91b111e423e00867298f4fba0934
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe$
Filesize7.7MB
MD591e37f06b7062ba7aef582eaaea266f3
SHA14b80d7e2cece7de550b605e1cd4ac1c23f8d94bb
SHA2567b15655628ceb099c570bc6fbfd8feda2dec8e3a4d9bee9568782f6275dd9cc3
SHA512d4fc7a51bd59b103fded06b20e2da30a898f3253db31c839b827371f33f062a2861381ec673625c93e2c4b5511f1672d4620d7ad175bca652e9a94eeafc8bfc5
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe$
Filesize8.2MB
MD568fa6144f6aabe955924fc343838d343
SHA1ef90fc3ab708d20d92118fbc1109830e5985fe97
SHA2564d49f04ea0253151a9cd91e4eb84deaf5f812532ad4a0cc32fa135fdd59430e9
SHA512dfd79305e795a9f935c703ed01ef32ba2df4c84aecfffebb0d1ec6c39a0e80da87f03d944867b78d734c96a7f98e3f2eb1a77ae42f43c67b7723321297869492
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe$
Filesize8.2MB
MD5a59f6c9977ce088595d6f0ec93010f6f
SHA12a5c459cfcb21b6cea435a485c544ac15704ebcc
SHA256d54380dbc64b8e7c228f517fcfe2f17cab54ce7081b4efe252d88f9eb11b8817
SHA5129fb5afa5f9045dcb16a0c4a92ef50dab9758e7afce87054c45bb9ca2af045448013771624a1367f1b426f180655f79b3cd67b0b95e52e606bceec94c6e10b376
-
Filesize
7.7MB
MD510f3c423473b9194eb939f0a85cb289e
SHA1c8bcc5ed1abb931477eff60ec9108dadfed41524
SHA256228e62d0e6c1bbcdee50360e9eb294fa9c1638ac6d008df08e64a7d9869f3467
SHA512e5ea45a7eb141b05b2383aa22c6012d285f405c3308d6e9cb962e5379fc31593f67863e7fb8bc08d4834a3c875f726a151bfc898557112ae2ae62d05e769ea34