Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
-
Size
456KB
-
MD5
1586cc3a130eecae62a61fae4e4db332
-
SHA1
aa30896f6f3969335a5ac3bcc7023a7817875700
-
SHA256
0799ce6bca68ee46cd9c7c6a4519bd1182678176e38e49a3415f759159eec046
-
SHA512
a754074814fef94e0b0d6b73018eff7b1c94cecfbcc693db99df5dfe73d6159910dcc4c3b3e37de9b67014b66c4a8c0877f1b9e2bd60fedea429607609186651
-
SSDEEP
6144:zg+GnUR3dZVzcqON3wlrfnvoGL4+kPKy/OIjw/5UR3dZVzcqON3wlrfnOeg+BKni:vVtQcrHapjy6VtQcrgnwXQPk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tokka.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "tokka.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe\Debugger = "winlogon.exe" Tokka.exe -
Executes dropped EXE 4 IoCs
pid Process 2840 go.exe 2544 Tokka.exe 2856 go.exe 2728 Tokka.exe -
Loads dropped DLL 8 IoCs
pid Process 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 2840 go.exe 2840 go.exe 2544 Tokka.exe 2544 Tokka.exe 2856 go.exe 2856 go.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" Tokka.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" Tokka.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File created C:\Users\Admin\AppData\Local\Temp\autorun.inf 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.inf Tokka.exe File created C:\Windows\SysWOW64\autorun.inf Tokka.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\go.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File created C:\Windows\SysWOW64\Tokka.exe go.exe File created C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\taskmgr.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\taskmgr.exe Tokka.exe File opened for modification C:\Windows\SysWOW64\go.exe Tokka.exe File opened for modification C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\autorun.inf Tokka.exe File created C:\Windows\SysWOW64\autorun.inf Tokka.exe -
Kills process with taskkill 2 IoCs
pid Process 2864 taskkill.exe 2592 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "Happy Tokka vs. Microsoft Internet Explorer" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "Happy Tokka vs. Microsoft Internet Explorer" Tokka.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 2840 go.exe 2840 go.exe 2544 Tokka.exe 2544 Tokka.exe 2856 go.exe 2856 go.exe 2728 Tokka.exe 2728 Tokka.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2864 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 28 PID 1988 wrote to memory of 2864 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 28 PID 1988 wrote to memory of 2864 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 28 PID 1988 wrote to memory of 2864 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 28 PID 1988 wrote to memory of 2840 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 30 PID 1988 wrote to memory of 2840 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 30 PID 1988 wrote to memory of 2840 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 30 PID 1988 wrote to memory of 2840 1988 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2544 2840 go.exe 32 PID 2840 wrote to memory of 2544 2840 go.exe 32 PID 2840 wrote to memory of 2544 2840 go.exe 32 PID 2840 wrote to memory of 2544 2840 go.exe 32 PID 2544 wrote to memory of 2592 2544 Tokka.exe 33 PID 2544 wrote to memory of 2592 2544 Tokka.exe 33 PID 2544 wrote to memory of 2592 2544 Tokka.exe 33 PID 2544 wrote to memory of 2592 2544 Tokka.exe 33 PID 2544 wrote to memory of 2856 2544 Tokka.exe 35 PID 2544 wrote to memory of 2856 2544 Tokka.exe 35 PID 2544 wrote to memory of 2856 2544 Tokka.exe 35 PID 2544 wrote to memory of 2856 2544 Tokka.exe 35 PID 2856 wrote to memory of 2728 2856 go.exe 36 PID 2856 wrote to memory of 2728 2856 go.exe 36 PID 2856 wrote to memory of 2728 2856 go.exe 36 PID 2856 wrote to memory of 2728 2856 go.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\taskkill.exetaskkill /s . /f /im taskmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\go.exego.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Tokka.exeC:\Windows\SysWOW64\Tokka.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /s . /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\go.exego.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Tokka.exeC:\Windows\SysWOW64\Tokka.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5289b2b890f83ed21a1db157b74813226
SHA1512fc87f2d105a9449aea9a3ceb19c5d1667cf73
SHA2567e98ea87f04ca754a6b8f6abc74ff08f20faa50f85b9071af6bc322106d394cd
SHA5125f6dd5f5f437b10f8d6efcfde7a5c28eaff00c7d42df8f4b0982fda25c9920dfef7464372d687c981418a1037549a6f598e5294620aa3cabd50fb786093bf35a
-
Filesize
456KB
MD51586cc3a130eecae62a61fae4e4db332
SHA1aa30896f6f3969335a5ac3bcc7023a7817875700
SHA2560799ce6bca68ee46cd9c7c6a4519bd1182678176e38e49a3415f759159eec046
SHA512a754074814fef94e0b0d6b73018eff7b1c94cecfbcc693db99df5dfe73d6159910dcc4c3b3e37de9b67014b66c4a8c0877f1b9e2bd60fedea429607609186651
-
Filesize
60KB
MD5ac9223cd1090d3c19753028b8f63793f
SHA1167e04c62af0c5413344eb1e69bc6df45dbe0545
SHA2565c97e87d145f9beade1f6330b6db08e3bc499aaac7405326223209e4522746d6
SHA51222b594a3c1a253745164414fd44ba542f7a361b4ada9959c36cd5cb251ad03e52b3d91b86ce9c1c03d80bf82ff3297792e326d6e80f04449eb58b303a8a6f5be