Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
-
Size
463KB
-
MD5
50333dad192d9888ce17fa31bd466256
-
SHA1
0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
-
SHA256
875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
-
SHA512
c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
SSDEEP
6144:cbiYCMinOZCVn3PzN2bZB8gpqECIm0ROn49SY851EkTH6z26nGgvkfA77juvpMh2:AWMQtJ32qEZRzSYWvzlPfA7Xu
Malware Config
Signatures
-
Registers new Print Monitor 2 TTPs 12 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
spoolsv.exespoolsv.exepid process 4612 spoolsv.exe 2736 spoolsv.exe -
Processes:
spoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exespoolsv.exedescription pid process target process PID 3452 set thread context of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 4612 set thread context of 2736 4612 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 3 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe File opened for modification C:\Windows\assembly 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
spoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe -
Modifies data under HKEY_USERS 22 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exe50333dad192d9888ce17fa31bd466256JaffaCakes118.exespoolsv.exespoolsv.exepid process 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 4612 spoolsv.exe 2736 spoolsv.exe 2736 spoolsv.exe 2736 spoolsv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
spoolsv.exepid process 2736 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exe50333dad192d9888ce17fa31bd466256JaffaCakes118.exespoolsv.exespoolsv.exedescription pid process Token: SeDebugPrivilege 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe Token: SeDebugPrivilege 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe Token: SeDebugPrivilege 4612 spoolsv.exe Token: SeDebugPrivilege 2736 spoolsv.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
50333dad192d9888ce17fa31bd466256JaffaCakes118.exe50333dad192d9888ce17fa31bd466256JaffaCakes118.execmd.exespoolsv.exedescription pid process target process PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 3452 wrote to memory of 2276 3452 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe PID 2276 wrote to memory of 3300 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe cmd.exe PID 2276 wrote to memory of 3300 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe cmd.exe PID 2276 wrote to memory of 3300 2276 50333dad192d9888ce17fa31bd466256JaffaCakes118.exe cmd.exe PID 3300 wrote to memory of 3216 3300 cmd.exe PING.EXE PID 3300 wrote to memory of 3216 3300 cmd.exe PING.EXE PID 3300 wrote to memory of 3216 3300 cmd.exe PING.EXE PID 3300 wrote to memory of 4612 3300 cmd.exe spoolsv.exe PID 3300 wrote to memory of 4612 3300 cmd.exe spoolsv.exe PID 3300 wrote to memory of 4612 3300 cmd.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe PID 4612 wrote to memory of 2736 4612 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 80004⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeC:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe.logFilesize
128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeFilesize
463KB
MD550333dad192d9888ce17fa31bd466256
SHA10e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
memory/2276-11-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/2276-7-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/2276-8-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/2276-6-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/3452-0-0x00000000751B2000-0x00000000751B3000-memory.dmpFilesize
4KB
-
memory/3452-2-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/3452-1-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/3452-23-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/4612-15-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/4612-16-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/4612-17-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB
-
memory/4612-26-0x00000000751B0000-0x0000000075761000-memory.dmpFilesize
5.7MB