Analysis
-
max time kernel
147s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe
-
Size
110KB
-
MD5
239918b0fbfe3c0533efeabe3ab38e80
-
SHA1
2e4888fcc5e3f4d536e4408e4147c2b123b5c5f9
-
SHA256
6dc67e911889b91fe2c5a58b719193b90b8f491997e1a89b58f06495d1908091
-
SHA512
5fcafe79a57c0d6bce66bd95de8482749ae9ae198a2afc0302cb93e8a12dccc51f5fd468ae3adf3daec99c96782c110df3a82f2bb30dbe031c72c89632db68ad
-
SSDEEP
1536:33KwIU4VH7qfUKU5nY2RduEw5miXdOxBguYm4goGHxyBw8JG3d0o7cLy1eK/y+7H:ZIUKZE2buEwAOYxBGndGHxd/Hx1zaoB
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\nyuserinit = "C:\\Windows\\system32\\inf\\svchosts.exe C:\\Windows\\system32\\lwfdfia16_080524.dll tanlt88" sgcxcxxaspf080524.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run sgcxcxxaspf080524.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation svchosts.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation sgcxcxxaspf080524.exe -
Deletes itself 1 IoCs
pid Process 2428 svchosts.exe -
Executes dropped EXE 2 IoCs
pid Process 2428 svchosts.exe 4128 sgcxcxxaspf080524.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 svchosts.exe 2428 svchosts.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\inf\sppdcrs080524.scr 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File created C:\Windows\SysWOW64\mdbbccasys32_080524.dll 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File created C:\Windows\SysWOW64\inf\scsys16_080524.dll 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File created C:\Windows\SysWOW64\lwfdfia16_080524.dll 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File created C:\Windows\SysWOW64\mdbbccasys32_080524.dll sgcxcxxaspf080524.exe File created C:\Windows\SysWOW64\inf\svchosts.exe 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\inf\svchosts.exe 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\pwisys.ini svchosts.exe File opened for modification C:\Windows\pwisys.ini sgcxcxxaspf080524.exe File opened for modification C:\Windows\pwisys.ini 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe File created C:\Windows\system\sgcxcxxaspf080524.exe 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" sgcxcxxaspf080524.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{35575720-3978-11EF-BCA5-CEC6030110C3} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426199271" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe 4128 sgcxcxxaspf080524.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe Token: SeDebugPrivilege 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe Token: SeDebugPrivilege 4128 sgcxcxxaspf080524.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2428 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 80 PID 4376 wrote to memory of 2428 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 80 PID 4376 wrote to memory of 2428 4376 239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe 80 PID 2428 wrote to memory of 1108 2428 svchosts.exe 82 PID 2428 wrote to memory of 1108 2428 svchosts.exe 82 PID 2428 wrote to memory of 1108 2428 svchosts.exe 82 PID 1108 wrote to memory of 4128 1108 cmd.exe 84 PID 1108 wrote to memory of 4128 1108 cmd.exe 84 PID 1108 wrote to memory of 4128 1108 cmd.exe 84 PID 4128 wrote to memory of 1352 4128 sgcxcxxaspf080524.exe 87 PID 4128 wrote to memory of 1352 4128 sgcxcxxaspf080524.exe 87 PID 1352 wrote to memory of 1740 1352 IEXPLORE.EXE 88 PID 1352 wrote to memory of 1740 1352 IEXPLORE.EXE 88 PID 1352 wrote to memory of 1740 1352 IEXPLORE.EXE 88 PID 4128 wrote to memory of 1352 4128 sgcxcxxaspf080524.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\239918b0fbfe3c0533efeabe3ab38e80_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\inf\svchosts.exe"C:\Windows\system32\inf\svchosts.exe" C:\Windows\system32\lwfdfia16_080524.dll tanlt882⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "c:\mylstecj.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system\sgcxcxxaspf080524.exe"C:\Windows\system\sgcxcxxaspf080524.exe" i4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
30KB
MD5513706bb78cc32b4b66f990f7f8bfb7c
SHA1d4cd418910d6836fda76b98ae05a4a50cdc3486a
SHA256d50abd3c754ecff4f6ead59a9ce8a9eeef4e98b74085c1d12d04dc5f46f13ff8
SHA512a95c2a77d2feddef52393f07c092ee13c8938a67f52cafbd580a78fc403f6edcb79837022a583facace06f78d0d1c99634ae4da8f849bb9bd7d154fd0cce3205
-
Filesize
219KB
MD5ed7669743669bea3e93673bde0dc6e77
SHA1993cb45adf0d7d02c938e4de1e790e97f0328156
SHA2562334fe36f6f25b463497b50ce2d17e2c5660f114cd84ff8db43923c990445f9a
SHA5129e41b013b9da82fc7d8ddc38744d2f4b90c41b2ca56e892688053441833005c71fbc1f3d849e84c577920c9ab8d4bd18318587279c6b9b8c2ab1fed434a358a6
-
Filesize
110KB
MD5239918b0fbfe3c0533efeabe3ab38e80
SHA12e4888fcc5e3f4d536e4408e4147c2b123b5c5f9
SHA2566dc67e911889b91fe2c5a58b719193b90b8f491997e1a89b58f06495d1908091
SHA5125fcafe79a57c0d6bce66bd95de8482749ae9ae198a2afc0302cb93e8a12dccc51f5fd468ae3adf3daec99c96782c110df3a82f2bb30dbe031c72c89632db68ad
-
Filesize
46B
MD5ad050d7e1d59564c9d02540298eabb59
SHA184c271cca9dca7096b39afd0d11ea2b6d5a3f5b7
SHA256f7a66cdb82fbd033de93095a19cbd516378ce7e519e61be5a9a0f78770fb4f20
SHA5123be127925bcd668a16fb654c17d61cf434317529c01466b2b1c6932f42370b2ebfe5bd4102343f807f4011ff15a506ab6a73e45149e4f62215959ffb56bfc8fc
-
Filesize
464B
MD5e331b04e396f5d660139d913d382662c
SHA1f74b8255006ae8f630665ebed91c9808905b2439
SHA2567ad31811c5a4a6798917e9956777bbf35611c9b4d6c82b7de1ae1c6d5c12b986
SHA51214753b1f75b3ea2c7462cd0e6a86bba5ec49ac89595fddff05f7be097724722015c33d50decf02c596ab4ea9248b0de2c5e826d7db12998b9468576863af017a
-
Filesize
380B
MD5692018dc24b0ae2408d4a060b73ba028
SHA144a9d184c99dc777a36e5b302688e5e18c03851d
SHA256a3af1d7ff5be26ce9da2d98945e3d75f33735763d83031cfc48e74289fca6bd8
SHA512bc6d707ed081e9385ecf65eaa15318fc24c58682bf95d71f366306fea1482c5425cd173b292c17bf024b9fe396dbe8a4f3a9ea07f580fffe2b7784fd7bf3166d
-
Filesize
408B
MD53dea3d3e2ffbb453b20c4575693abb35
SHA184347a27a694c3a95473b1815a2f867b20d4cc0c
SHA256a9128b743e854e677fcde0835e14bd69f9c77ac556d9c115d15a540d18de1aec
SHA512f107b6fdb4342713c3bb8fabaa33a79b415483667f7be933408f5612972305b587bf40f43d594d02b1d653248164009ab3ac54cd52464a0591cdbc40168cd4ce
-
Filesize
414B
MD5fd083048a8cec89d237918e92f96784e
SHA1104b23a9943cd2f74eabd5e8df0628d246c3857f
SHA2561513fedb387080f469c025922c6b2b2e9c8a06069b56faa311e899d6ebb1b755
SHA512ce6ebc8a60fee5562f2e8f82123af849520e082bdd788f0ea6d132dfa4d60ddde417dab60134ed9d5065936e6ef9cb25cf09e89901acb2cd16e9f4bdde03a12d
-
Filesize
447B
MD5675bd5b520aaa08937d253dc723aeb5b
SHA1504c830583b1578a21d5e3c2d471a5153e31b5a7
SHA2564f31953ecc05911304a0066704ac809af295be182ecba756581d57658d86e223
SHA51204943b51f2172218b7516c186035fe5fd8cf56499f3840bad8fa94aabd8f542abd18cd811d0efbcd4692b5cde4871df1e4e97cb59443798db904a23f22d7c560
-
Filesize
474B
MD502658167ada7375cf9d5b2a77a02928e
SHA11fef7d24d781f27daf514fa9d3dbf05d4a0da3e4
SHA2567abfe30394716269903b3315878fdf72a21fc9b5e83bdc38248bb68f16347c76
SHA512bac080aebd638f96349798bbf83d00e7a5b8407e2e28a277f78f89b5ae87a922fb2ecf211cb0180c13ad59da91490fc14cfa01019120de42ab8027bbb9b2cd44
-
Filesize
53B
MD5eb2f5dc6301407527c05e3d4353b0f0c
SHA1bc555d826341ab4b5b4704e3276e195325317b6d
SHA256d5348c5dcb991966a942758a8234ab6445c4a687d347095b1382b4fa1f2f534c
SHA5125c58e5f8c97394350d3da6607792707716cd2dc7196eabdd18a6172f572a0722a08d042ed2d1846dc212cdf085724ef4f28e7786c12e8c2347b1b30c0794624d