Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe
-
Size
5.5MB
-
MD5
1f8187292660e4ab4a567f917ed5fee8
-
SHA1
832442b51532bff1a93b62e8a64509d81ea58294
-
SHA256
067454e4c56e421442cd036923c2a8b7f60f4f4ce59f4243160d36f959d1bff1
-
SHA512
be84f01f27898e933be08e5cbe75a2cdf976f5dc99876bf67171fb9c94b25863e41a823aef89ca52c3d87694ca4eb065425b1312a64baea78ca70de673a76330
-
SSDEEP
98304:gvSYro+waPiQjmjP028bc0TtJEJNx5DJXMWbD0nLWI9HJn6wz6+Ln7kr+qrRW6Ja:WpUwjmjc28Imk3jsymJn62t3UE6llYn
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Active Setup\Installed Components 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{2C7339CF-2B09-4501-B3F3-F3508C9228ED} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6BF52A52-394A-11D3-B153-00C04F79FAA6} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{89820200-ECBD-11CF-8B85-00AA005B4340} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{89820200-ECBD-11CF-8B85-00AA005B4383} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{89B4C1CD-B018-4511-B0A1-5476DBF70820} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{8A69D345-D564-463C-AFF1-A69D9E530F96} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp Key deleted \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{9459C573-B17A-45AE-9F64-1857B5D58CEE} 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp -
Executes dropped EXE 1 IoCs
pid Process 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp -
Loads dropped DLL 2 IoCs
pid Process 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp -
pid Process 2156 powershell.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 powershell.exe 2156 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2156 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4592 1592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe 84 PID 1592 wrote to memory of 4592 1592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe 84 PID 1592 wrote to memory of 4592 1592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe 84 PID 4592 wrote to memory of 2488 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp 87 PID 4592 wrote to memory of 2488 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp 87 PID 4592 wrote to memory of 2488 4592 1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp 87 PID 2488 wrote to memory of 2156 2488 cmd.exe 89 PID 2488 wrote to memory of 2156 2488 cmd.exe 89 PID 2488 wrote to memory of 2156 2488 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\is-E6P1P.tmp\1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-E6P1P.tmp\1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.tmp" /SL5="$30240,5495633,56832,C:\Users\Admin\AppData\Local\Temp\1f8187292660e4ab4a567f917ed5fee8_JaffaCakes118.exe"2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-ARH8V.tmp\ex.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};} Write-Host ($avlist -join \"*\")}"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09
-
Filesize
786B
MD57c7413909ddd96fbecf604155f19f13b
SHA13dd52978d573d944ec52521ca84ba4a83130d6dd
SHA256c26179762b4f04e158a0bf51611cfe11d468982a80b825db34dd474a4d820787
SHA51204394a1e22c1d0b01b8c5e821fc2c6c96b5d13676f29b6cf0134187fcda8041a1e0d1188fe7b502d22093a5433c297efc29920bc8a76377afac6f16a782fb606
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
693KB
MD5160db79a135d5f5eb6e5f504ed4c38c9
SHA18ded92aa5a701cbea1b3d0ba64bce647bf89f008
SHA256f6520eeff2df974d976fc2c7237536b69d238b5e462927565d539faf3a6fd82c
SHA5126f1c9238de82db7596a9ac9052613c08c3a30af8b7e1a869333da7ca221ea5393a86088de4394ae408a9e2d4a792ad688f21df97066067195a2427d581642ebe