Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe
-
Size
355KB
-
MD5
926c5694a1bceffc43896b4a4009e457
-
SHA1
b821d0ca3caf0a8d2de114da0faab772b22e0efe
-
SHA256
0182f2e29965d54c5aea14679765c19ef2397e42ac2464b113bc9c6da89f618f
-
SHA512
3ec7fb2c12d5010cd514ed54eaecaba16f31e279e508af71e3dc7c0cf2161e34a7df6b4ad2fe7c931f6841712515b92757189ac6029ffefef54d3cbb12811791
-
SSDEEP
6144:J3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:emWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d176f3e9 = "¡‡‰5dVq*”E’\u008fóu\x05\r‰¾øJ¾šˆ4\x1cnŒ¨\u00a0\x18–ÍE…\x0eÌ:pàØ+½\x16F¼›fë^-àp]C;Ý›¦\r\x1aµÐö5µÈí”UÓ\u00ad\x16½¾„\"ÀTu\rr€X´~®K]ÌÅ\x14\x05k°•m•Å6mz\u00a0•\x1c,®ìxs@6Æ\b<\u00ad†>í\x04ÒŽ5•Â…öElFÞöjBBžê-\x15\u009d–RÞÒøÕ=¾ës¼‚ä\u009dóÝ8#œ#:[}„“n`¼f\u00a0\x1dõZbÎ\u00ad”êõÝDü]ÐÝ‚:Ä\x10\u00adN² µ\u008d\x18\u00a0\n\x066¸¶:Ä\x1c°VJØn\x13þ&Ý\u009dFLU¶\u009d³V³" 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d176f3e9 = "¡‡‰5dVq*”E’\u008fóu\x05\r‰¾øJ¾šˆ4\x1cnŒ¨\u00a0\x18–ÍE…\x0eÌ:pàØ+½\x16F¼›fë^-àp]C;Ý›¦\r\x1aµÐö5µÈí”UÓ\u00ad\x16½¾„\"ÀTu\rr€X´~®K]ÌÅ\x14\x05k°•m•Å6mz\u00a0•\x1c,®ìxs@6Æ\b<\u00ad†>í\x04ÒŽ5•Â…öElFÞöjBBžê-\x15\u009d–RÞÒøÕ=¾ës¼‚ä\u009dóÝ8#œ#:[}„“n`¼f\u00a0\x1dõZbÎ\u00ad”êõÝDü]ÐÝ‚:Ä\x10\u00adN² µ\u008d\x18\u00a0\n\x066¸¶:Ä\x1c°VJØn\x13þ&Ý\u009dFLU¶\u009d³V³" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe 4912 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4912 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 82 PID 4960 wrote to memory of 4912 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 82 PID 4960 wrote to memory of 4912 4960 926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\926c5694a1bceffc43896b4a4009e457_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
102KB
MD54a47e9a58194d96c6f963bc9822c9a9c
SHA174cedc692a03dcbcd6cf21cc57274f8cc34b166f
SHA25627c72c51096c45343eba03af9145d177e8b40f35d2854df4b22e321ca1db7121
SHA5124497185e0d8f3647667af961882806dca736eedb678d9869b95ac595ed7f9ff7f2c406fdbf5542c1162f313235c52967d8e13b66a07b1de6d75898e444987a13
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
355KB
MD5a5384e2897d7885d93412f928d116c36
SHA1d1d7df6c0d90fb3ef5cbd1b702a142cfe99e7624
SHA256a48438132860824c165fb5fb29155b75ffc10eb0e0be8ba754b9b04e2e09a86a
SHA5127a21b117e1a53e6846c67339edf7019220ca7f36cb45b0fb2f5fbc3873f7e3c795e491bff154b077fdf63aea008fc6480bb4ce91cb24c54206ca63f6b02591d0