Analysis
-
max time kernel
141s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
0cc7aea12dcb1c719c281c186fe53e4c
-
SHA1
48a02d6a917523716e17becc95b6b449d50ceffb
-
SHA256
f28c793f683ba6deee7510b60f0a5e90830df59d81d10907c6bdbd08e3d5136b
-
SHA512
b50072a50895f8e74ed587dfb16bd43b0a3ccf3b24304d6c6e052fb1d30a1af34d793424501ffb72bd701f9b2c9ac1fa1014d966a851fc9d5882fe06fc442d92
-
SSDEEP
49152:Kh+Iy6ausuSc41msMQ/FwZcG+cpWgyJD9hixDHopctc+kMUeoW:KEIy6ak4MCM+8pKbi1H4hMUg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4416 autorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\IESettingSync autorun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" autorun.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch autorun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" autorun.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4416 autorun.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1676 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4416 autorun.exe 4416 autorun.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4416 autorun.exe 4416 autorun.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 216 0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe 4416 autorun.exe 4416 autorun.exe 4416 autorun.exe 4416 autorun.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 4416 216 0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe 84 PID 216 wrote to memory of 4416 216 0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe 84 PID 216 wrote to memory of 4416 216 0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\0cc7aea12dcb1c719c281c186fe53e4c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x414 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5be0fbff8e9330f29d06daa16fa6532ac
SHA1005f4e11c3d5079a1eb7d2cdd0853211d6fe7369
SHA25655bb257a5f110e3ed5218bf3ac0e785277c3918bc9ab58400fa7dc5fce48d945
SHA512f36f039ab64069fbda4ce0aa81ebf956a4ca7644025d363b6a619d9911e9a3eeb1acc6bc254d3a1423a62cbe2fb213218998f3053ddd2f569c3929c0a2e7c8a8
-
Filesize
936B
MD5410a51d506e46d96977ba17c0d62fc08
SHA1222f975f927ebcf9c6a0763b7abb71dd245ffffa
SHA2563507817bbcb56505a9e74d9e9513451d9f239a41e1c321cc9dee0cb238f6e5ff
SHA512316ec8cfa968fa53b93ba510b8f7ef8fa6049ab9b441f0b96bff3e574b43090a42b4da3d0336c86a20103b1f7f2798dd8cad0cc6117cca713c272b24a632f71a
-
Filesize
11KB
MD50a5d1f6f364140063684926b508d272f
SHA18299a808f3a5058a22029e78b8f2fea2fa312002
SHA2566b2b2640881482a70ef8ab5e5f5ff54157269863612b1154df028f5cc62ea4e4
SHA512374448710b772612969963a122b11be19392e08fa12c3c329f7a95a5ec24f234782ae9e0e9254dff17f25a271714d716a15214d4b69e923759afa9723c6403ca
-
Filesize
2.8MB
MD578f01d099d2b759d2936c58f8005cbbe
SHA16996af950e4d6bb6fd2aa0af5cafae8af1d8c97a
SHA256ffa740e17c4dac2cb65bf8d3e931992c73cf373a1203713d1743e247254f0fa6
SHA512e92cba8948983db09acba445de04cbfd081854f3b468dcd102db8e67f89e94ead01fa1961ed823e1479b78e83cb005e22137dc98282abca019358d81fc3d45b9
-
Filesize
97KB
MD57d53a14e6220cf0fbdb3b204c2a4064f
SHA1c649d6e14d28a085bd153600cd4fe602e7ae071f
SHA2569c7157762ee5f5643f00073d47b795807173efcfa282928747e3c9413906a7b4
SHA5125be3d44daf663f8057e0c6154ed4e43d6b0406a75ee6f3b994b6c56a1a3d158d92e546614bf06490038726a74c6b1fe3e3c983ddb6313e79e4773b9b9dec5cc2