Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
-
Size
463KB
-
MD5
50333dad192d9888ce17fa31bd466256
-
SHA1
0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
-
SHA256
875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
-
SHA512
c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
SSDEEP
6144:cbiYCMinOZCVn3PzN2bZB8gpqECIm0ROn49SY851EkTH6z26nGgvkfA77juvpMh2:AWMQtJ32qEZRzSYWvzlPfA7Xu
Malware Config
Signatures
-
Registers new Print Monitor 2 TTPs 12 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
spoolsv.exespoolsv.exepid process 1500 spoolsv.exe 2160 spoolsv.exe -
Processes:
spoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exedescription pid process target process PID 3964 set thread context of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 1500 set thread context of 2160 1500 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 3 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\assembly 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
spoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe -
Modifies data under HKEY_USERS 22 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exespoolsv.exepid process 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 1500 spoolsv.exe 2160 spoolsv.exe 2160 spoolsv.exe 2160 spoolsv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
spoolsv.exepid process 2160 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.exespoolsv.exespoolsv.exedescription pid process Token: SeDebugPrivilege 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe Token: SeDebugPrivilege 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe Token: SeDebugPrivilege 1500 spoolsv.exe Token: SeDebugPrivilege 2160 spoolsv.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe50333dad192d9888ce17fa31bd466256_JaffaCakes118.execmd.exespoolsv.exedescription pid process target process PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3964 wrote to memory of 3004 3964 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe PID 3004 wrote to memory of 3036 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 3004 wrote to memory of 3036 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 3004 wrote to memory of 3036 3004 50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe cmd.exe PID 3036 wrote to memory of 2620 3036 cmd.exe PING.EXE PID 3036 wrote to memory of 2620 3036 cmd.exe PING.EXE PID 3036 wrote to memory of 2620 3036 cmd.exe PING.EXE PID 3036 wrote to memory of 1500 3036 cmd.exe spoolsv.exe PID 3036 wrote to memory of 1500 3036 cmd.exe spoolsv.exe PID 3036 wrote to memory of 1500 3036 cmd.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe PID 1500 wrote to memory of 2160 1500 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 80004⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeC:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe.logFilesize
128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479
-
C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exeFilesize
463KB
MD550333dad192d9888ce17fa31bd466256
SHA10e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3
-
memory/1500-26-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/1500-16-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/1500-17-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/1500-15-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3004-6-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/3004-11-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3004-8-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3004-7-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3964-0-0x0000000074A02000-0x0000000074A03000-memory.dmpFilesize
4KB
-
memory/3964-2-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3964-23-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB
-
memory/3964-1-0x0000000074A00000-0x0000000074FB1000-memory.dmpFilesize
5.7MB