Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe
-
Size
576KB
-
MD5
422ce6f21fc5115dcf2b0d680e818c30
-
SHA1
4b8dae13dcf6bbc4844e2366a33f5cdde34f1de0
-
SHA256
58f0aac0446ace81b865fa6e79d286deadcf5f2ac897da3d8cb2a25654db52ad
-
SHA512
130c4fa0a2cd9b348418562af28930d91f0933b9fa6c86766d70f5c25cf11879c2155b66b92c3c26eea3544e7307eea96fa43f9c9b78794337ecc6cce9daf373
-
SSDEEP
12288:jmWhND9yJz+b1FcMLmp2ATTSsdxmWhND9yJz+b1FcMLmpG:jmUNJyJqb1FcMap2ATT5rmUNJyJqb1Fl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3988 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\df406419 = "²Ü‚¼kÏZÐa¢_FÆŸRµ-½Îsõ1X\x12 iC\x1aš\x0f„\x1eoæïªnß\aö\x04Á‡Ê\"Œ¦‹×œj36ñ:ëô>‰§Î::A\x14¯ËÇ~‡\\ÖòôO¤Nù÷»\f·®éé\x06¹×´\a”\a\x7f#Ü<\fï¦ç,×{7Ê?t÷R4\x12)q¡šŸ„\x1cáÇ\u008fì×\x7f×\x1a<*,\x1c¯\u008fq£¶áææúQ–§{D{_ŸÑº^Ë?ÚÖÏ\x01îë\x1e›¯w§—¦ñ£ß\x1fY.×âœVDn\x14®Ë»º\a.²¾ËùÄ7'F9\x19>\x1cNßçÖÜïv\x01鬇“\x7fAöbš\x19\x0e6÷äw¯ä!//΢>{)G\x1fN\x12Ë\x17ÃAS¬\x01'\aW\x02f\x1c\x1aN\x11«l\fž\vy\x12_?óv" 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\df406419 = "²Ü‚¼kÏZÐa¢_FÆŸRµ-½Îsõ1X\x12 iC\x1aš\x0f„\x1eoæïªnß\aö\x04Á‡Ê\"Œ¦‹×œj36ñ:ëô>‰§Î::A\x14¯ËÇ~‡\\ÖòôO¤Nù÷»\f·®éé\x06¹×´\a”\a\x7f#Ü<\fï¦ç,×{7Ê?t÷R4\x12)q¡šŸ„\x1cáÇ\u008fì×\x7f×\x1a<*,\x1c¯\u008fq£¶áææúQ–§{D{_ŸÑº^Ë?ÚÖÏ\x01îë\x1e›¯w§—¦ñ£ß\x1fY.×âœVDn\x14®Ë»º\a.²¾ËùÄ7'F9\x19>\x1cNßçÖÜïv\x01鬇“\x7fAöbš\x19\x0e6÷äw¯ä!//΢>{)G\x1fN\x12Ë\x17ÃAS¬\x01'\aW\x02f\x1c\x1aN\x11«l\fž\vy\x12_?óv" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3988 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 85 PID 3304 wrote to memory of 3988 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 85 PID 3304 wrote to memory of 3988 3304 422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\422ce6f21fc5115dcf2b0d680e818c30_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
481B
MD5a9f919f68a3f2a5c5318c11aba21a768
SHA10dc3d3142df608a0dfceb8a64f0b795b2fa78884
SHA25681d0bed5be5ee0ae2f9c84fab44f94d18f0ae724bd3cf1a13c993c2366a27353
SHA512c811b065f1278df95e1154735a22420e9196dac55a11702739f34bd2759bc3e2f330768a41fb48aadc2360e68f8349273dbba8a514821538904183bc6429cae0
-
Filesize
23KB
MD5ef368cb8967a767205851b69e811b1bd
SHA147913ac8423c22f6b60447803f8249a147c5ab41
SHA256e923d1e2e25f76be71323709ecb21c657ffb593f5b8fbc9b23a001e6a9f8a4c5
SHA5122aa78ca366f953cbb53789d7836cd68bc2561f057983079720c52a63c812371286c5b1981d16425cdd415191f8612ea9feeb6b71fd90b97020f7187a00fab424
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
576KB
MD5bc1e3df319f75c8c5f2ca3a3ce0e1f17
SHA1e8b6fa6555577454b9bf22badefbc59b2247c047
SHA256edd17116ac1da048b2aa399e080aefd6ce8c6564851310a1c4989ecfc34389f4
SHA51289c14e045756519147478acee3e3214377a9c120531183aae9af049ee583a72b6cac6c8a765524055039402b32009a3c72366cb16aac3db2a27c7f2e24cee15e