Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe
-
Size
306KB
-
MD5
227055efda5b3a7a08e641cea942d42d
-
SHA1
53a0c4ccab3debe1de69cb93229a795ca202c868
-
SHA256
899d7ecaafc66af4c4931176d91cb6186520e2ec3c76adabb0806cf8ee1119b6
-
SHA512
c567489da0a7c52b67e96e0a4ce61da38075407a4b613d1f7a8841c804391e2e856642fbc3ee113c8d937bc647f2742f340e89b14d450b54178169c954a6c470
-
SSDEEP
6144:vRCPLFtCGNgE+kU9e33G7kMgFBHwNrqVJobzr8y:vRCPLFbuEPvHsqVJobH
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2968 oca.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 oca.exe -
Loads dropped DLL 2 IoCs
pid Process 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2628 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe Token: SeShutdownPrivilege 2628 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe 2628 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2968 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2968 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2968 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2968 2140 227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\oca.exe"C:\Users\Admin\AppData\Local\oca.exe" -gav C:\Users\Admin\AppData\Local\Temp\227055efda5b3a7a08e641cea942d42d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2968
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD5fd08cf8afdfda3803dd6c004be2fc314
SHA198a75807bd58c6eafe558b343ab7b30824ecbd9d
SHA256b5d61708594490e5aaff9a8d2c04127e100616d1877a032ef4cb974f026a2dbb
SHA5128b839595b281d7df6499a2315f7c717df0e60e6595697539344423bde1dc95cac9167e78543b4badc0fb771a116e7c8849fb8ef8a3bd57a9d2f46a46f4631d37