Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 07:31
Behavioral task
behavioral1
Sample
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe
-
Size
647KB
-
MD5
040e131e6072a3bbb3472d17446ed7a4
-
SHA1
c1d2a37b3ec90c19ca49602a8a03f64a16d3c706
-
SHA256
8d66803ee8c28f8c9930677f18a331867e46977e982aea278131fd0592c31d7f
-
SHA512
1941a28b8b2a208764fb708a957b78af75e060df7c0f4c1b0aade3531e65874cb62f301ba4904b61bcdd6f15d817d043176301af8fef99dd34452a4264a37106
-
SSDEEP
12288:A8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixm:5UKoN0bUxgGa/pfBHDb+y1HgZ8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\word.exe" 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
word.exepid process 2520 word.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exeword.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\Documents\\word.exe" 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\Documents\\word.exe" word.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
word.exepid process 2520 word.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exeword.exedescription pid process Token: SeIncreaseQuotaPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSecurityPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemtimePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeBackupPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeRestorePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeShutdownPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeDebugPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeUndockPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeManageVolumePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeImpersonatePrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 33 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 34 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 35 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: 36 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2520 word.exe Token: SeSecurityPrivilege 2520 word.exe Token: SeTakeOwnershipPrivilege 2520 word.exe Token: SeLoadDriverPrivilege 2520 word.exe Token: SeSystemProfilePrivilege 2520 word.exe Token: SeSystemtimePrivilege 2520 word.exe Token: SeProfSingleProcessPrivilege 2520 word.exe Token: SeIncBasePriorityPrivilege 2520 word.exe Token: SeCreatePagefilePrivilege 2520 word.exe Token: SeBackupPrivilege 2520 word.exe Token: SeRestorePrivilege 2520 word.exe Token: SeShutdownPrivilege 2520 word.exe Token: SeDebugPrivilege 2520 word.exe Token: SeSystemEnvironmentPrivilege 2520 word.exe Token: SeChangeNotifyPrivilege 2520 word.exe Token: SeRemoteShutdownPrivilege 2520 word.exe Token: SeUndockPrivilege 2520 word.exe Token: SeManageVolumePrivilege 2520 word.exe Token: SeImpersonatePrivilege 2520 word.exe Token: SeCreateGlobalPrivilege 2520 word.exe Token: 33 2520 word.exe Token: 34 2520 word.exe Token: 35 2520 word.exe Token: 36 2520 word.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
word.exepid process 2520 word.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.execmd.exedescription pid process target process PID 2136 wrote to memory of 2292 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 2136 wrote to memory of 2292 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 2136 wrote to memory of 2292 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe cmd.exe PID 2292 wrote to memory of 2728 2292 cmd.exe attrib.exe PID 2292 wrote to memory of 2728 2292 cmd.exe attrib.exe PID 2292 wrote to memory of 2728 2292 cmd.exe attrib.exe PID 2136 wrote to memory of 2520 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe PID 2136 wrote to memory of 2520 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe PID 2136 wrote to memory of 2520 2136 040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe word.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\040e131e6072a3bbb3472d17446ed7a4_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\Documents\word.exe"C:\Users\Admin\Documents\word.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\word.exeFilesize
647KB
MD5040e131e6072a3bbb3472d17446ed7a4
SHA1c1d2a37b3ec90c19ca49602a8a03f64a16d3c706
SHA2568d66803ee8c28f8c9930677f18a331867e46977e982aea278131fd0592c31d7f
SHA5121941a28b8b2a208764fb708a957b78af75e060df7c0f4c1b0aade3531e65874cb62f301ba4904b61bcdd6f15d817d043176301af8fef99dd34452a4264a37106
-
memory/2136-63-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2136-0-0x0000000002360000-0x0000000002361000-memory.dmpFilesize
4KB
-
memory/2520-68-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-70-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-65-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-66-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-67-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-62-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2520-69-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-64-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-71-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-72-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-73-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-74-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-75-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-76-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/2520-77-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB