Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
068dca5294b5060298631f2adf944735_JaffaCakes118.exe
-
Size
390KB
-
MD5
068dca5294b5060298631f2adf944735
-
SHA1
6266c1dd5d7008a9322a253c56e5b42850d7a664
-
SHA256
3e319d191903a91e1d8dcf84ae11139be9dc064550cd896378134607c40e836a
-
SHA512
93724ad5326747ee67ba9455c905e018697c8c4be32c9ba88cb5cd5f2a25535014cd5d45c5b311f71a84eeddb2965a74ce422262677cc23463ba01908560689f
-
SSDEEP
6144:TG0tZhwWYGKONpKPfMXsKuiHyAxM6LV+gQlXRsj3mQTxvV9DDZN9X/xymS:JTqONpKPfMXcm1hwlB63mCV9r3LS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" 068dca5294b5060298631f2adf944735_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 068dca5294b5060298631f2adf944735_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
Microsoft.exeMicrosoft.exepid process 3172 Microsoft.exe 2392 Microsoft.exe -
Processes:
resource yara_rule behavioral2/memory/4884-3-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-2-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-4-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-5-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-6-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-7-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4884-23-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-32-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-31-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-30-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-33-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-35-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-37-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-36-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-34-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-38-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-39-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-40-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-41-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-42-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-43-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-44-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-45-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-46-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-47-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-48-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-49-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-50-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-51-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-52-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2392-53-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Microsoft.exe068dca5294b5060298631f2adf944735_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" Microsoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Microsoft.exe" 068dca5294b5060298631f2adf944735_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process target process PID 936 set thread context of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 3172 set thread context of 2392 3172 Microsoft.exe Microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process Token: SeIncreaseQuotaPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSecurityPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemtimePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeBackupPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeRestorePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeShutdownPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeDebugPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeUndockPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeManageVolumePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeImpersonatePrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 33 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 34 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 35 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: 36 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2392 Microsoft.exe Token: SeSecurityPrivilege 2392 Microsoft.exe Token: SeTakeOwnershipPrivilege 2392 Microsoft.exe Token: SeLoadDriverPrivilege 2392 Microsoft.exe Token: SeSystemProfilePrivilege 2392 Microsoft.exe Token: SeSystemtimePrivilege 2392 Microsoft.exe Token: SeProfSingleProcessPrivilege 2392 Microsoft.exe Token: SeIncBasePriorityPrivilege 2392 Microsoft.exe Token: SeCreatePagefilePrivilege 2392 Microsoft.exe Token: SeBackupPrivilege 2392 Microsoft.exe Token: SeRestorePrivilege 2392 Microsoft.exe Token: SeShutdownPrivilege 2392 Microsoft.exe Token: SeDebugPrivilege 2392 Microsoft.exe Token: SeSystemEnvironmentPrivilege 2392 Microsoft.exe Token: SeChangeNotifyPrivilege 2392 Microsoft.exe Token: SeRemoteShutdownPrivilege 2392 Microsoft.exe Token: SeUndockPrivilege 2392 Microsoft.exe Token: SeManageVolumePrivilege 2392 Microsoft.exe Token: SeImpersonatePrivilege 2392 Microsoft.exe Token: SeCreateGlobalPrivilege 2392 Microsoft.exe Token: 33 2392 Microsoft.exe Token: 34 2392 Microsoft.exe Token: 35 2392 Microsoft.exe Token: 36 2392 Microsoft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exeMicrosoft.exepid process 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 3172 Microsoft.exe 2392 Microsoft.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
068dca5294b5060298631f2adf944735_JaffaCakes118.exe068dca5294b5060298631f2adf944735_JaffaCakes118.exeMicrosoft.exedescription pid process target process PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 936 wrote to memory of 4884 936 068dca5294b5060298631f2adf944735_JaffaCakes118.exe 068dca5294b5060298631f2adf944735_JaffaCakes118.exe PID 4884 wrote to memory of 3172 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 4884 wrote to memory of 3172 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 4884 wrote to memory of 3172 4884 068dca5294b5060298631f2adf944735_JaffaCakes118.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe PID 3172 wrote to memory of 2392 3172 Microsoft.exe Microsoft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\068dca5294b5060298631f2adf944735_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Microsoft.exeFilesize
390KB
MD5068dca5294b5060298631f2adf944735
SHA16266c1dd5d7008a9322a253c56e5b42850d7a664
SHA2563e319d191903a91e1d8dcf84ae11139be9dc064550cd896378134607c40e836a
SHA51293724ad5326747ee67ba9455c905e018697c8c4be32c9ba88cb5cd5f2a25535014cd5d45c5b311f71a84eeddb2965a74ce422262677cc23463ba01908560689f
-
memory/2392-38-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-53-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-34-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-52-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-51-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-50-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-49-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-32-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-31-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-30-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-33-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-35-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-37-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-36-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-48-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-39-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-47-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-40-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-41-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-42-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-43-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-44-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-45-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2392-46-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-4-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-5-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-23-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-2-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-7-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-6-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4884-3-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB