Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
01468a69ca8676b51a357676e0856c88
-
SHA1
4413a7f864255767a6d84c3e8362b9873a7e224b
-
SHA256
fcccc611730474775ff1cfd4c60481deef586f01191348b07d7a143d174a07b0
-
SHA512
d0d516c96c14e4ec5dded82e80f82a3ff6b2f8c2aae63b8f0e8667aea6e07e52e8dcf2ee7939304ef2303b07a4b8ca6e6c64f985a508d57aad79440d479d68b8
-
SSDEEP
49152:Na175O/mZxrkaH1EN5/yxnxEil7F8vSZBWwj186KQGwi38KQrF+FO7p1FzohbJqE:uO/mZxbHW7yxnxECF8vSZBW+Pbi38KQU
Malware Config
Signatures
-
Detects PlugX payload 15 IoCs
resource yara_rule behavioral2/memory/3540-39-0x00000000026D0000-0x00000000026FE000-memory.dmp family_plugx behavioral2/memory/3188-41-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-54-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3540-56-0x00000000026D0000-0x00000000026FE000-memory.dmp family_plugx behavioral2/memory/3188-55-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-52-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-53-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-40-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/2304-66-0x0000000001220000-0x000000000124E000-memory.dmp family_plugx behavioral2/memory/2304-69-0x0000000001220000-0x000000000124E000-memory.dmp family_plugx behavioral2/memory/2304-68-0x0000000001220000-0x000000000124E000-memory.dmp family_plugx behavioral2/memory/3188-299-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-552-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-574-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx behavioral2/memory/3188-575-0x00000000017A0000-0x00000000017CE000-memory.dmp family_plugx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\meekness.lnk rudiment.exe -
Executes dropped EXE 1 IoCs
pid Process 3540 rudiment.exe -
Loads dropped DLL 1 IoCs
pid Process 3540 rudiment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MJ\CLSID = 44003100390045003200320044003200440030004400360045004100420038000000 svchost.exe Key created \REGISTRY\MACHINE\Software\CLASSES\MJ svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3372 WINWORD.EXE 3372 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 3188 svchost.exe 3188 svchost.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 3188 svchost.exe 3188 svchost.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe 2304 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3188 svchost.exe 2304 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3540 rudiment.exe Token: SeTcbPrivilege 3540 rudiment.exe Token: SeDebugPrivilege 3188 svchost.exe Token: SeTcbPrivilege 3188 svchost.exe Token: SeDebugPrivilege 2304 msiexec.exe Token: SeTcbPrivilege 2304 msiexec.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE 3372 WINWORD.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3540 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 93 PID 5100 wrote to memory of 3540 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 93 PID 5100 wrote to memory of 3540 5100 01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe 93 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3540 wrote to memory of 3188 3540 rudiment.exe 94 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97 PID 3188 wrote to memory of 2304 3188 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\rudiment.exeC:\Users\Admin\AppData\Local\Temp\rudiment.exe2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
116KB
MD5654c5fe3e9e5134f69a683ba17d21512
SHA18a5fe839f2ff04369928a64745d0d975c72937a2
SHA2565080d2c9a0a5bd2de0a00386dae99fa63a3ebc18299cc01114b4966c16eaae7e
SHA512e881bd59267b8947235fafafad3229967db02b92aa92c12eb3acf34cf82932abac24ff709a46e8b8d2ae823a25cf32b3811b955ea5259d4b4c69a7781f9b4e66
-
Filesize
47KB
MD5b5bdaba69689e8be57ce78bb6845e4f0
SHA1573c35ab1f243d6806dedbdd7e3265bc5cbd5b9a
SHA2561e712adae2a543bf2fbf41691416b350c3a90561ab5f6590e520f833a9a587ad
SHA512e79aaa4ac9b79ce7008155fddafc1bee58aae67d4ab6a0308702a9d47c29e83583c6786f2fa0c3812e50ef6eea1de981f5108ca752837b5edb8041236ff3c6c5
-
Filesize
112KB
MD5c6110df133b583488587974c5485bfbe
SHA125882d89fe1c65893e3a328e3676da614e261509
SHA2566dba4f30583ce37d537ed06623de941ba5de22197504664ff1fad89f8a372520
SHA5129b2ebb8172ef93d667848136e0a67cee6a3c6cfb2e66533b98acc2ae4cad38388e422c8d5c616a5a4f9f05325e228c9623d4f16db59f8e4a287c068f91bdb38a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84