Analysis
-
max time kernel
149s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe
-
Size
411KB
-
MD5
1e95e087ddc336bc8cc038866c629537
-
SHA1
68ff0f62b626aae7f11d5a1d7e2f7906cbe1a606
-
SHA256
567b94bcdaea498b72ea3b4193d16a0eeb6807a02fefe59b9b87d0ae03d8dcd4
-
SHA512
5e999094124243fccb6ed9f4eda9df203e527ca48c6d01126258b16c9f9b2546e6e4bb9a89db6b8e49cab71f3ec8625e42d2f3245603d0e3229df6b766ce0c15
-
SSDEEP
12288:nPCNpaWbDrPHwfoXjRrPzD1lbMoKGRtq:Pd+8Uj5PnjbMoKD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation nvxdsinc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4000 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4000 set thread context of 2716 4000 explorer.exe 81 PID 1088 set thread context of 3628 1088 nwtray.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 1568 timeout.exe 3008 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe 2756 nvxdsinc.exe 1088 nwtray.exe 4000 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4920 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe Token: SeDebugPrivilege 4000 explorer.exe Token: SeDebugPrivilege 2756 nvxdsinc.exe Token: SeDebugPrivilege 1088 nwtray.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4000 4920 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 80 PID 4920 wrote to memory of 4000 4920 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 80 PID 4920 wrote to memory of 4000 4920 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 80 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 4000 wrote to memory of 2716 4000 explorer.exe 81 PID 2716 wrote to memory of 1716 2716 AppLaunch.exe 82 PID 2716 wrote to memory of 1716 2716 AppLaunch.exe 82 PID 2716 wrote to memory of 1716 2716 AppLaunch.exe 82 PID 1716 wrote to memory of 1568 1716 cmd.exe 85 PID 1716 wrote to memory of 1568 1716 cmd.exe 85 PID 1716 wrote to memory of 1568 1716 cmd.exe 85 PID 4000 wrote to memory of 2756 4000 explorer.exe 84 PID 4000 wrote to memory of 2756 4000 explorer.exe 84 PID 4000 wrote to memory of 2756 4000 explorer.exe 84 PID 2756 wrote to memory of 1088 2756 nvxdsinc.exe 86 PID 2756 wrote to memory of 1088 2756 nvxdsinc.exe 86 PID 2756 wrote to memory of 1088 2756 nvxdsinc.exe 86 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 1088 wrote to memory of 3628 1088 nwtray.exe 87 PID 3628 wrote to memory of 4576 3628 AppLaunch.exe 88 PID 3628 wrote to memory of 4576 3628 AppLaunch.exe 88 PID 3628 wrote to memory of 4576 3628 AppLaunch.exe 88 PID 4576 wrote to memory of 3008 4576 cmd.exe 90 PID 4576 wrote to memory of 3008 4576 cmd.exe 90 PID 4576 wrote to memory of 3008 4576 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe6⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\timeout.exetimeout 57⤵
- Delays execution with timeout.exe
PID:3008
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5078e9b825edb16211e11ff0e179170a8
SHA17471ae7132b9ac5aa62fe72c0ed548945683696a
SHA25684c4f91eb41a51fa78b1ad5ca8913d9c074d0416967bf035c731f3a4908bfd16
SHA512d09f30744b4f513846a6e964de3a12c408d98c8bf98977f04b68082d83ea2566162756a36f54c8500f27ee9deddd2bb3aa91ea54076e83fba7a70efc058383a4
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274
-
Filesize
411KB
MD51e95e087ddc336bc8cc038866c629537
SHA168ff0f62b626aae7f11d5a1d7e2f7906cbe1a606
SHA256567b94bcdaea498b72ea3b4193d16a0eeb6807a02fefe59b9b87d0ae03d8dcd4
SHA5125e999094124243fccb6ed9f4eda9df203e527ca48c6d01126258b16c9f9b2546e6e4bb9a89db6b8e49cab71f3ec8625e42d2f3245603d0e3229df6b766ce0c15