Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe
-
Size
929KB
-
MD5
131af0e4c40f5e7dfca711a45816fa37
-
SHA1
5c72ad82cd2da3807290c2d384546740097dd8c9
-
SHA256
f4d30cb13736e18e207fe01046a535f4152c3c9d0581214fd9caf8dc7f19e0ea
-
SHA512
dcb2d216965ec03d4cd691327f65a7f1ceede9253c0a16ab8c5d3aca66a6809c65637b264329ae76bae55927d5e6ced5a6f10297110cf5ac9e9af1e29d1bec19
-
SSDEEP
24576:iY7WkuuKVuKBWXmKyT6duKvvbyyUHb8V0Zpu9Aooo0:57WvuKV9BWbymveHAsC
Malware Config
Signatures
-
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
winlogon.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation winlogon.exe -
Executes dropped EXE 1 IoCs
Processes:
winlogon.exepid process 460 winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Logon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winlogon.exe" 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exedescription pid process target process PID 2996 set thread context of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
winlogon.exepid process 460 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exewinlogon.exedescription pid process Token: SeDebugPrivilege 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 460 winlogon.exe Token: SeSecurityPrivilege 460 winlogon.exe Token: SeTakeOwnershipPrivilege 460 winlogon.exe Token: SeLoadDriverPrivilege 460 winlogon.exe Token: SeSystemProfilePrivilege 460 winlogon.exe Token: SeSystemtimePrivilege 460 winlogon.exe Token: SeProfSingleProcessPrivilege 460 winlogon.exe Token: SeIncBasePriorityPrivilege 460 winlogon.exe Token: SeCreatePagefilePrivilege 460 winlogon.exe Token: SeBackupPrivilege 460 winlogon.exe Token: SeRestorePrivilege 460 winlogon.exe Token: SeShutdownPrivilege 460 winlogon.exe Token: SeDebugPrivilege 460 winlogon.exe Token: SeSystemEnvironmentPrivilege 460 winlogon.exe Token: SeChangeNotifyPrivilege 460 winlogon.exe Token: SeRemoteShutdownPrivilege 460 winlogon.exe Token: SeUndockPrivilege 460 winlogon.exe Token: SeManageVolumePrivilege 460 winlogon.exe Token: SeImpersonatePrivilege 460 winlogon.exe Token: SeCreateGlobalPrivilege 460 winlogon.exe Token: 33 460 winlogon.exe Token: 34 460 winlogon.exe Token: 35 460 winlogon.exe Token: 36 460 winlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
winlogon.exepid process 460 winlogon.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exewinlogon.execmd.exedescription pid process target process PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 2996 wrote to memory of 460 2996 131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe winlogon.exe PID 460 wrote to memory of 1696 460 winlogon.exe cmd.exe PID 460 wrote to memory of 1696 460 winlogon.exe cmd.exe PID 460 wrote to memory of 1696 460 winlogon.exe cmd.exe PID 1696 wrote to memory of 1140 1696 cmd.exe attrib.exe PID 1696 wrote to memory of 1140 1696 cmd.exe attrib.exe PID 1696 wrote to memory of 1140 1696 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\131af0e4c40f5e7dfca711a45816fa37_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\winlogon.exeC:\Users\Admin\AppData\Local\Temp\winlogon.exe2⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\winlogon.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD53821868491a01953e5f2f922ae9ff8b0
SHA12daf28fa5ce2c3b55c25c8fc4a1d5a03f9b85bce
SHA256d9c3e5032a4eaea21cebe6aeeca341459f8d256c7b39f4bcd34e27e12deaabb8
SHA51225c93ce1fc01a369306c769b861def036085aef807e0d0952830098d197b37e0d93a7d98c0df49aeff05b8493050df07d56307d643ff8421d7b31aa000e807e9
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0