Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe
-
Size
902KB
-
MD5
1bc52faf563eeda4207272d8c57f27cb
-
SHA1
3cd4a821c82f388ece2b847af087c79868ea903b
-
SHA256
d9a35e4493b187726d129d1406521a902daffc1f50a75ad022975a5b796505cd
-
SHA512
239b792ce0649b7fd37954635145f0dfa81cc69708602730ed6e2ac18048f85ed658676a0701a9d6c0058fd3f2ebd8154c48e45e65d2b95a78337f1631466d95
-
SSDEEP
6144:+sObgrnx69AfwfXerpnW737BfTlwBQYenqVt/9Fob/ADKoQ32WZDrYm4AV9fcVQe:hObaBwsW7LtUQYeqV+CKrdVWPd4i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winregedit = "\\winlogomereg\\windowsreg.exe" 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winregedit = "C:\\Users\\Admin\\AppData\\Roaming\\winlogomereg\\windowsreg.exe" 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1384 set thread context of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 4208 set thread context of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4424 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe Token: SeDebugPrivilege 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe Token: SeDebugPrivilege 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe Token: SeDebugPrivilege 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe Token: 33 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3752 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 1384 wrote to memory of 5088 1384 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 98 PID 5088 wrote to memory of 4208 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 100 PID 5088 wrote to memory of 4208 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 100 PID 5088 wrote to memory of 4208 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 100 PID 5088 wrote to memory of 4284 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 101 PID 5088 wrote to memory of 4284 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 101 PID 5088 wrote to memory of 4284 5088 1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe 101 PID 4284 wrote to memory of 4424 4284 cmd.exe 103 PID 4284 wrote to memory of 4424 4284 cmd.exe 103 PID 4284 wrote to memory of 4424 4284 cmd.exe 103 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109 PID 4208 wrote to memory of 3752 4208 1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:4424
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Temp\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118\1bc52faf563eeda4207272d8c57f27cb_jaffacakes118.exe
Filesize902KB
MD51bc52faf563eeda4207272d8c57f27cb
SHA13cd4a821c82f388ece2b847af087c79868ea903b
SHA256d9a35e4493b187726d129d1406521a902daffc1f50a75ad022975a5b796505cd
SHA512239b792ce0649b7fd37954635145f0dfa81cc69708602730ed6e2ac18048f85ed658676a0701a9d6c0058fd3f2ebd8154c48e45e65d2b95a78337f1631466d95
-
Filesize
58B
MD551a4170a9160da180a43ca226d0e823f
SHA112d468ffa3913d3805929b3a78ca5d301b821ebc
SHA256858676fbf48084bef66c7e78bced690378ce38c9795b36dc3543f7ebc28d05fe
SHA512ccc7f8edd27340cfd1aa8161231bdc769c5228a63917efe24c106fc47f0ac102b8170ad14a6c42adf15c885285864968c63844390bff1cbab8c6dfb75d999010