Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 07:31
Behavioral task
behavioral1
Sample
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
-
Size
647KB
-
MD5
040e131e6072a3bbb3472d17446ed7a4
-
SHA1
c1d2a37b3ec90c19ca49602a8a03f64a16d3c706
-
SHA256
8d66803ee8c28f8c9930677f18a331867e46977e982aea278131fd0592c31d7f
-
SHA512
1941a28b8b2a208764fb708a957b78af75e060df7c0f4c1b0aade3531e65874cb62f301ba4904b61bcdd6f15d817d043176301af8fef99dd34452a4264a37106
-
SSDEEP
12288:A8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixm:5UKoN0bUxgGa/pfBHDb+y1HgZ8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\word.exe" 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Executes dropped EXE 1 IoCs
Processes:
word.exepid process 2528 word.exe -
Loads dropped DLL 2 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exepid process 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exeword.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\Documents\\word.exe" 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\Documents\\word.exe" word.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
word.exepid process 2528 word.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exeword.exedescription pid process Token: SeIncreaseQuotaPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSecurityPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemtimePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeBackupPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeRestorePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeShutdownPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeDebugPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeUndockPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeManageVolumePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeImpersonatePrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 33 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 34 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 35 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2528 word.exe Token: SeSecurityPrivilege 2528 word.exe Token: SeTakeOwnershipPrivilege 2528 word.exe Token: SeLoadDriverPrivilege 2528 word.exe Token: SeSystemProfilePrivilege 2528 word.exe Token: SeSystemtimePrivilege 2528 word.exe Token: SeProfSingleProcessPrivilege 2528 word.exe Token: SeIncBasePriorityPrivilege 2528 word.exe Token: SeCreatePagefilePrivilege 2528 word.exe Token: SeBackupPrivilege 2528 word.exe Token: SeRestorePrivilege 2528 word.exe Token: SeShutdownPrivilege 2528 word.exe Token: SeDebugPrivilege 2528 word.exe Token: SeSystemEnvironmentPrivilege 2528 word.exe Token: SeChangeNotifyPrivilege 2528 word.exe Token: SeRemoteShutdownPrivilege 2528 word.exe Token: SeUndockPrivilege 2528 word.exe Token: SeManageVolumePrivilege 2528 word.exe Token: SeImpersonatePrivilege 2528 word.exe Token: SeCreateGlobalPrivilege 2528 word.exe Token: 33 2528 word.exe Token: 34 2528 word.exe Token: 35 2528 word.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
word.exepid process 2528 word.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.execmd.exedescription pid process target process PID 1948 wrote to memory of 2668 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 1948 wrote to memory of 2668 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 1948 wrote to memory of 2668 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 1948 wrote to memory of 2668 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 2668 wrote to memory of 2148 2668 cmd.exe attrib.exe PID 2668 wrote to memory of 2148 2668 cmd.exe attrib.exe PID 2668 wrote to memory of 2148 2668 cmd.exe attrib.exe PID 2668 wrote to memory of 2148 2668 cmd.exe attrib.exe PID 1948 wrote to memory of 2528 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe PID 1948 wrote to memory of 2528 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe PID 1948 wrote to memory of 2528 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe PID 1948 wrote to memory of 2528 1948 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\Documents\word.exe"C:\Users\Admin\Documents\word.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\word.exeFilesize
647KB
MD5040e131e6072a3bbb3472d17446ed7a4
SHA1c1d2a37b3ec90c19ca49602a8a03f64a16d3c706
SHA2568d66803ee8c28f8c9930677f18a331867e46977e982aea278131fd0592c31d7f
SHA5121941a28b8b2a208764fb708a957b78af75e060df7c0f4c1b0aade3531e65874cb62f301ba4904b61bcdd6f15d817d043176301af8fef99dd34452a4264a37106
-
memory/1948-0-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/1948-12-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-18-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-20-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-15-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-16-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-17-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-13-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-19-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-14-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-21-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-22-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-23-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-24-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-25-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2528-26-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB