Analysis
-
max time kernel
44s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 19:46
Behavioral task
behavioral1
Sample
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe
-
Size
57KB
-
MD5
0f4ccae69015afd983f4ab966f38b4f1
-
SHA1
16216ea7edb6972cf4189a1a5653b48bb916193e
-
SHA256
10f215af08b5714530bd8699db9882754f0aa0d136ed96e7d963de66e88e948b
-
SHA512
f0d972606844321b09c1ebf0e1ba5907b19d4b9c0f1279820173d86afefe8762498cb4892e91335ae9475ebbc56a8dfca93b1cc71dc0f23e4ab61204f4157f00
-
SSDEEP
1536:jqrOgsoj6m/yJrc01ty85ohFPDfKiDTTqHn2:Ieoj6m/y15WlDfzC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4416-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4416-17-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6AA669767177215dD47 = "C:\\Users\\Admin\\976717721\\976717721.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "221" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 412 shutdown.exe Token: SeRemoteShutdownPrivilege 412 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4752 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 91 PID 4416 wrote to memory of 4752 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 91 PID 4416 wrote to memory of 4752 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 91 PID 4752 wrote to memory of 412 4752 cmd.exe 93 PID 4752 wrote to memory of 412 4752 cmd.exe 93 PID 4752 wrote to memory of 412 4752 cmd.exe 93 PID 4416 wrote to memory of 3768 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 95 PID 4416 wrote to memory of 3768 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 95 PID 4416 wrote to memory of 3768 4416 0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe 95 PID 3768 wrote to memory of 2292 3768 cmd.exe 97 PID 3768 wrote to memory of 2292 3768 cmd.exe 97 PID 3768 wrote to memory of 2292 3768 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f4ccae69015afd983f4ab966f38b4f1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c w.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\shutdown.exeshutdown /r /f /t 53⤵
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 6AA669767177215dD47 /t REG_SZ /d "C:\Users\Admin\976717721\976717721.EXE" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 6AA669767177215dD47 /t REG_SZ /d "C:\Users\Admin\976717721\976717721.EXE" /f3⤵
- Adds Run key to start application
PID:2292
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39fd855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD5923e49878a9e3f5225bc4bb9568c6e87
SHA1e5a6d603500d08f53c94a4e74367681cf5e6dc51
SHA2563ef572594f0917a2146aa5a4a567be049c5840a972363c92ce4d4258104abf77
SHA5124f6720afc1431defcd4bb7c1b14d878338906d0b410b6c8255f46efa7df36cfc0e832d9520a28ed6daaedf19a769bf4050e514338bf5f3c67c66945b742824d3