Analysis
-
max time kernel
159s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe
-
Size
321KB
-
MD5
7a76310e8ed433e10ddba6b898340240
-
SHA1
c2e1790dd0ccdb180f43a9cecfd2609883b0b98d
-
SHA256
9560685c75f98ab9a01e5f272208db8816e88da4218ee87ca8a0b678f8e385ae
-
SHA512
b0803a82e520fe27286f550d102c26dba1e84fce450577ea54b4c7e76a5dabf7ff48863a26bdd45f14bc0021c8602272b3f4d6887028b07fdb848fa61fcb749a
-
SSDEEP
6144:u4nby/WmbAC/ACtuQLlEXGQfsQmblf3QtPvlPObfjwWno0k2HP:u4nG8vMFEXZsJxYtHyQNoP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchosl = "\\svchosl\\svchosl.exe" 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchosl = "C:\\Users\\Admin\\AppData\\Roaming\\svchosl\\svchosl.exe" 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe File opened for modification C:\Windows\assembly 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4972 PING.EXE -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe Token: SeDebugPrivilege 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe Token: 33 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4796 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 101 PID 1712 wrote to memory of 4796 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 101 PID 1712 wrote to memory of 4796 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 101 PID 1712 wrote to memory of 3988 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 102 PID 1712 wrote to memory of 3988 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 102 PID 1712 wrote to memory of 3988 1712 7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe 102 PID 3988 wrote to memory of 4972 3988 cmd.exe 104 PID 3988 wrote to memory of 4972 3988 cmd.exe 104 PID 3988 wrote to memory of 4972 3988 cmd.exe 104 PID 4796 wrote to memory of 1712 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 90 PID 4796 wrote to memory of 1712 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 90 PID 4796 wrote to memory of 1712 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 90 PID 4796 wrote to memory of 1712 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 90 PID 4796 wrote to memory of 1712 4796 7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_jaffacakes118\7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_jaffacakes118\7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4972
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:4760
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7a76310e8ed433e10ddba6b898340240_jaffacakes118\7a76310e8ed433e10ddba6b898340240_jaffacakes118.exe
Filesize321KB
MD57a76310e8ed433e10ddba6b898340240
SHA1c2e1790dd0ccdb180f43a9cecfd2609883b0b98d
SHA2569560685c75f98ab9a01e5f272208db8816e88da4218ee87ca8a0b678f8e385ae
SHA512b0803a82e520fe27286f550d102c26dba1e84fce450577ea54b4c7e76a5dabf7ff48863a26bdd45f14bc0021c8602272b3f4d6887028b07fdb848fa61fcb749a
-
Filesize
50B
MD567b1152e9924eb00ecadeb2721d435df
SHA164b78a5bd36d5bc3a68191ad06b1cbad44d3cd90
SHA2567966bc0ae95d7a88e4463713086c0676f54d5501d17e5ebc30a3cfa5835e49e8
SHA51214c8f6135cd48e361fa9d32f8f31f4698f24b8a36560002ae987898954a5809b6ac50fa08e20734002eb47cd51cd182df15fafbb630cd0f1d4022c4590d4fd62