Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe
-
Size
206KB
-
MD5
01732b6e6b7ebe6efed4369ea4aa8fb0
-
SHA1
262e971df34b999f17843a537532fcc275beb163
-
SHA256
4584282c886f57b2577b19a83d842f7d48595ad91487669e3906ae2601f7f4f2
-
SHA512
837c9e2ab0041b6f3b616b4984f5a6229e67b0d127e72dee5b762ee21282d72ff3260fb94532bbd894fed6341febde1ea2d18b373ae3526f82476b91d945b170
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unX:zvEN2U+T6i5LirrllHy4HUcMQY6u
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1188 explorer.exe 2524 spoolsv.exe 2080 svchost.exe 3092 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 1188 explorer.exe 1188 explorer.exe 1188 explorer.exe 1188 explorer.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe 1188 explorer.exe 1188 explorer.exe 2080 svchost.exe 2080 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1188 explorer.exe 2080 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 1188 explorer.exe 1188 explorer.exe 2524 spoolsv.exe 2524 spoolsv.exe 2080 svchost.exe 2080 svchost.exe 3092 spoolsv.exe 3092 spoolsv.exe 1188 explorer.exe 1188 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1188 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 82 PID 4576 wrote to memory of 1188 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 82 PID 4576 wrote to memory of 1188 4576 01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe 82 PID 1188 wrote to memory of 2524 1188 explorer.exe 83 PID 1188 wrote to memory of 2524 1188 explorer.exe 83 PID 1188 wrote to memory of 2524 1188 explorer.exe 83 PID 2524 wrote to memory of 2080 2524 spoolsv.exe 84 PID 2524 wrote to memory of 2080 2524 spoolsv.exe 84 PID 2524 wrote to memory of 2080 2524 spoolsv.exe 84 PID 2080 wrote to memory of 3092 2080 svchost.exe 85 PID 2080 wrote to memory of 3092 2080 svchost.exe 85 PID 2080 wrote to memory of 3092 2080 svchost.exe 85 PID 2080 wrote to memory of 624 2080 svchost.exe 86 PID 2080 wrote to memory of 624 2080 svchost.exe 86 PID 2080 wrote to memory of 624 2080 svchost.exe 86 PID 2080 wrote to memory of 1456 2080 svchost.exe 101 PID 2080 wrote to memory of 1456 2080 svchost.exe 101 PID 2080 wrote to memory of 1456 2080 svchost.exe 101 PID 2080 wrote to memory of 3148 2080 svchost.exe 111 PID 2080 wrote to memory of 3148 2080 svchost.exe 111 PID 2080 wrote to memory of 3148 2080 svchost.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01732b6e6b7ebe6efed4369ea4aa8fb0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
C:\Windows\SysWOW64\at.exeat 00:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:624
-
-
C:\Windows\SysWOW64\at.exeat 00:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1456
-
-
C:\Windows\SysWOW64\at.exeat 00:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3148
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e30d75c370a7c8daa8240c962c7e96e3
SHA1d6fe9b712f8922c702e12daec7299bfd4b8a488d
SHA256c328fec1cc75540cffbb8c3067282e39caf63f2150c3f984c84ea074f0a43496
SHA5127962e5c5a0c17e74ddb2626a91c3b841ee006a1c4c29aa068c38b847f3bb51f58554211d54b51af7052f98cabdcd1280836d8d4297f21818c8086e577fdf627b
-
Filesize
206KB
MD54cc06998cf9189110fc86cfaf8b62d09
SHA1d4f0904b0dbc6afdc382c80be0ae577e9995ef4d
SHA256ece41bb5199b65ef741e284922690593e8ad4bba8bc598af5274cd3163e817f7
SHA512751011b4adc89ee25de99f0172d15edafcbd001d98cbc5f6d81b8ce9cfc1f6b73ad8a034a28acfe0ee505ea57b52f996517fc2905aee9f20e260231a050edfd0
-
Filesize
206KB
MD5172b16f420e721494cba3711010be168
SHA18cd2fb9740d70c812a1f4e3d65b08f97c4e3dcf2
SHA25615be4e101b4b433766285a059f4506f28240d787367498df363fe82751817a7a
SHA51226cdb370acf404d15f14729bd3a4ecf1f3c2439b36b37a4837e4426a690668db03cb0238dd142701ee9f7c7c82da9f4266f8c60655cf066335d994b533fb822c
-
Filesize
206KB
MD50d87e1e043c44a3c74e2cdd3fc17eefa
SHA1b5afdb477304cdcc08ce7664425ab11084e28230
SHA2568144a040a44f22c52d79791367ed0729578cbece3cf0113b9a8774abd7b8b0d2
SHA512277740140b52d07074774a1f1b12acedb81c1f6b317b3c155a6ab064f2f756d1462e0321fa98e7148904ef8ed385d2275cc1cb2494e675878eadf726f47391ee