Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
-
Size
873KB
-
MD5
735ae0b3e03f102ac38f6e5dfb8188a7
-
SHA1
f7d1ac0ed7f9b2507e06f20589b746631b07adf0
-
SHA256
7304580f4667c8beaa430ff265a32166c6451c94d51287949be37312cad1cfb6
-
SHA512
47ef3a839c0f23c6bbea5266238e832b57cced7509f2750936dd1e252cf9acd2d0bee44fbbea7a70562b0af8a4b1669bdacf39c20f532c8968fd6d04c6d26693
-
SSDEEP
24576:KEtl9mRda1ISGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvS:BEs1lY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops startup file 2 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File opened (read-only) \??\P: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\S: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\V: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\X: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\G: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\I: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\J: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\A: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Q: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\T: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\L: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\O: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\R: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\U: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Z: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\B: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\E: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\H: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\W: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\Y: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\K: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\M: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened (read-only) \??\N: 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File opened for modification F:\AUTORUN.INF 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\AUTORUN.INF 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\notepad.exe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File created C:\Windows\SysWOW64\HelpMe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe.exe 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exepid process 444 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe 444 735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\735ae0b3e03f102ac38f6e5dfb8188a7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD577818941e879212e09037a83c2847c27
SHA1978bd79d74cbe679ba06121e620a099da939f8d1
SHA256847b3e2ca16331e970137ae6c8e87befad906f6c2b4403a2deef37018107325b
SHA512c49419d84110441a2ad600ba62f1fc0cf78f16f58b7a4ac9dda24632084bcc095450e90300e0f8e6a197b9901a0e8c72f596efc72c12581caead3944e3bab165
-
Filesize
1.6MB
MD5bf3d0cdfdc102b65c9cdd558e1369a9f
SHA1b3eb53ed700a8bc2e5002638307b5381374db78c
SHA256ff1cf028fcf8fcbc09713976b5804fb2e63124eb6986b9e372f746aed4980db2
SHA5123fa5fb7f04653cbf6aaecfa5c68071a318fe724f43b7efad9640f6c99f44760fe6de0e8d0079a89ef0b97790ceca2f05bb6dc5565981c05e596ef284367c5324
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47