Analysis
-
max time kernel
139s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe
-
Size
425KB
-
MD5
7034f17b2033bfd5ef9b0f81ce598da3
-
SHA1
959817c12dba46ce4e4595bf4f2374aadf52e8ef
-
SHA256
33175665dc003a737e982c767890412e57ea2ae96f25fd8535637f5894ff2074
-
SHA512
1390d2b6e58644238efb174f7b2726a5152e5b183dbbe4c02b0cacf796309df24c5e9bc4a4f26f1c525ae863f353020dcd6a63fa84afa6448072df87199a07c4
-
SSDEEP
6144:PqhlBy1+NR0frxdc6Dps/ep5NKWNzYXPAA5+VUbvpQhcHGBeBZq6wbTHK+5URA:PAlBpNR0fHcoNKWN7AQKG8BCbTHD9
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 1 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\forfiles.exe\"" 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe -
Drops startup file 1 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\forfiles.lnk 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
forfiles.exepid process 3188 forfiles.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\forfiles.exe\"" 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\forfiles = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\forfiles.exe\"" 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3124 taskkill.exe -
Modifies Control Panel 2 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\\forfiles.exe\"" 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe Token: SeDebugPrivilege 3124 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.execmd.exedescription pid process target process PID 3336 wrote to memory of 3188 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe forfiles.exe PID 3336 wrote to memory of 3188 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe forfiles.exe PID 3336 wrote to memory of 3188 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe forfiles.exe PID 3336 wrote to memory of 3372 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe cmd.exe PID 3336 wrote to memory of 3372 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe cmd.exe PID 3336 wrote to memory of 3372 3336 7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe cmd.exe PID 3372 wrote to memory of 3124 3372 cmd.exe taskkill.exe PID 3372 wrote to memory of 3124 3372 cmd.exe taskkill.exe PID 3372 wrote to memory of 3124 3372 cmd.exe taskkill.exe PID 3372 wrote to memory of 824 3372 cmd.exe PING.EXE PID 3372 wrote to memory of 824 3372 cmd.exe PING.EXE PID 3372 wrote to memory of 824 3372 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\forfiles.exe"C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\forfiles.exe"2⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "7034f17b2033bfd5ef9b0f81ce598da3_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\{2A62359E-001A-DB50-37C5-75EE5DF583A7}\forfiles.exeFilesize
425KB
MD57034f17b2033bfd5ef9b0f81ce598da3
SHA1959817c12dba46ce4e4595bf4f2374aadf52e8ef
SHA25633175665dc003a737e982c767890412e57ea2ae96f25fd8535637f5894ff2074
SHA5121390d2b6e58644238efb174f7b2726a5152e5b183dbbe4c02b0cacf796309df24c5e9bc4a4f26f1c525ae863f353020dcd6a63fa84afa6448072df87199a07c4
-
memory/3336-0-0x0000000002AA0000-0x0000000002B07000-memory.dmpFilesize
412KB
-
memory/3336-1-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB
-
memory/3336-2-0x0000000002AA0000-0x0000000002B07000-memory.dmpFilesize
412KB
-
memory/3336-4-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/3336-12-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB