Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe
-
Size
456KB
-
MD5
1586cc3a130eecae62a61fae4e4db332
-
SHA1
aa30896f6f3969335a5ac3bcc7023a7817875700
-
SHA256
0799ce6bca68ee46cd9c7c6a4519bd1182678176e38e49a3415f759159eec046
-
SHA512
a754074814fef94e0b0d6b73018eff7b1c94cecfbcc693db99df5dfe73d6159910dcc4c3b3e37de9b67014b66c4a8c0877f1b9e2bd60fedea429607609186651
-
SSDEEP
6144:zg+GnUR3dZVzcqON3wlrfnvoGL4+kPKy/OIjw/5UR3dZVzcqON3wlrfnOeg+BKni:vVtQcrHapjy6VtQcrgnwXQPk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tokka.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "tokka.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrlS.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PcCtlCom.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rtvscan.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe\Debugger = "winlogon.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "winlogon.exe" Tokka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc.exe\Debugger = "winlogon.exe" Tokka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 4764 go.exe 4428 Tokka.exe 388 go.exe 428 Tokka.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" Tokka.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShelI = "Tokka.exe" Tokka.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Windows\SysWOW64\autorun.inf Tokka.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File created C:\Users\Admin\AppData\Local\Temp\autorun.inf 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.inf Tokka.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\autorun.inf Tokka.exe File opened for modification C:\Windows\SysWOW64\taskmgr.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File created C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\taskmgr.exe Tokka.exe File created C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\autorun.inf Tokka.exe File opened for modification C:\Windows\SysWOW64\go.exe 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Tokka.exe go.exe File opened for modification C:\Windows\SysWOW64\go.exe Tokka.exe -
Kills process with taskkill 2 IoCs
pid Process 2620 taskkill.exe 2292 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Happy Tokka vs. Microsoft Internet Explorer" 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Happy Tokka vs. Microsoft Internet Explorer" Tokka.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 taskkill.exe Token: SeDebugPrivilege 2292 taskkill.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 4764 go.exe 4764 go.exe 4428 Tokka.exe 4428 Tokka.exe 388 go.exe 388 go.exe 428 Tokka.exe 428 Tokka.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2620 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 85 PID 4976 wrote to memory of 2620 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 85 PID 4976 wrote to memory of 2620 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 85 PID 4976 wrote to memory of 4764 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 87 PID 4976 wrote to memory of 4764 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 87 PID 4976 wrote to memory of 4764 4976 1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe 87 PID 4764 wrote to memory of 4428 4764 go.exe 88 PID 4764 wrote to memory of 4428 4764 go.exe 88 PID 4764 wrote to memory of 4428 4764 go.exe 88 PID 4428 wrote to memory of 2292 4428 Tokka.exe 90 PID 4428 wrote to memory of 2292 4428 Tokka.exe 90 PID 4428 wrote to memory of 2292 4428 Tokka.exe 90 PID 4428 wrote to memory of 388 4428 Tokka.exe 92 PID 4428 wrote to memory of 388 4428 Tokka.exe 92 PID 4428 wrote to memory of 388 4428 Tokka.exe 92 PID 388 wrote to memory of 428 388 go.exe 93 PID 388 wrote to memory of 428 388 go.exe 93 PID 388 wrote to memory of 428 388 go.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1586cc3a130eecae62a61fae4e4db332_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\taskkill.exetaskkill /s . /f /im taskmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\go.exego.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\Tokka.exeC:\Windows\SysWOW64\Tokka.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /s . /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\go.exego.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\Tokka.exeC:\Windows\SysWOW64\Tokka.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5289b2b890f83ed21a1db157b74813226
SHA1512fc87f2d105a9449aea9a3ceb19c5d1667cf73
SHA2567e98ea87f04ca754a6b8f6abc74ff08f20faa50f85b9071af6bc322106d394cd
SHA5125f6dd5f5f437b10f8d6efcfde7a5c28eaff00c7d42df8f4b0982fda25c9920dfef7464372d687c981418a1037549a6f598e5294620aa3cabd50fb786093bf35a
-
Filesize
456KB
MD51586cc3a130eecae62a61fae4e4db332
SHA1aa30896f6f3969335a5ac3bcc7023a7817875700
SHA2560799ce6bca68ee46cd9c7c6a4519bd1182678176e38e49a3415f759159eec046
SHA512a754074814fef94e0b0d6b73018eff7b1c94cecfbcc693db99df5dfe73d6159910dcc4c3b3e37de9b67014b66c4a8c0877f1b9e2bd60fedea429607609186651
-
Filesize
60KB
MD5ac9223cd1090d3c19753028b8f63793f
SHA1167e04c62af0c5413344eb1e69bc6df45dbe0545
SHA2565c97e87d145f9beade1f6330b6db08e3bc499aaac7405326223209e4522746d6
SHA51222b594a3c1a253745164414fd44ba542f7a361b4ada9959c36cd5cb251ad03e52b3d91b86ce9c1c03d80bf82ff3297792e326d6e80f04449eb58b303a8a6f5be