Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 22:13
Behavioral task
behavioral1
Sample
266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
7 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe
-
Size
14KB
-
MD5
266aedca0746a9606080c1b35371bc0e
-
SHA1
386b838975dee3a385747b8b9def7ffaf3818c35
-
SHA256
86211d3380f3c57727fbd0598b519e73bca251977cb4730188d282bf57f2b8dd
-
SHA512
a311d92d7159cc6b0689bffcd5bc75dc061980225fd145ccb71e063ed610a3779b17034d8cf03311f4f47d297ef3711ec3191613b9141a442a1b87a95f150228
-
SSDEEP
384:/PJkTWwGy1PZsxPCStZx42ymDJ8QZ+2P6vGDB:/P1wt1PZsxHZhymun
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4052-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4052-2-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4052-8-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4052-11-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MsnMsgr = "C:\\Windows\\system32\\msnmsgsr.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "62" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2732 shutdown.exe Token: SeRemoteShutdownPrivilege 2732 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1316 LogonUI.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4896 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 82 PID 4052 wrote to memory of 4896 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 82 PID 4052 wrote to memory of 4896 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 82 PID 4896 wrote to memory of 1476 4896 cmd.exe 83 PID 4896 wrote to memory of 1476 4896 cmd.exe 83 PID 4896 wrote to memory of 1476 4896 cmd.exe 83 PID 4052 wrote to memory of 3852 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 87 PID 4052 wrote to memory of 3852 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 87 PID 4052 wrote to memory of 3852 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 87 PID 3852 wrote to memory of 3188 3852 cmd.exe 88 PID 3852 wrote to memory of 3188 3852 cmd.exe 88 PID 3852 wrote to memory of 3188 3852 cmd.exe 88 PID 4052 wrote to memory of 4976 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 89 PID 4052 wrote to memory of 4976 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 89 PID 4052 wrote to memory of 4976 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 89 PID 4976 wrote to memory of 4484 4976 cmd.exe 90 PID 4976 wrote to memory of 4484 4976 cmd.exe 90 PID 4976 wrote to memory of 4484 4976 cmd.exe 90 PID 4052 wrote to memory of 4568 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 91 PID 4052 wrote to memory of 4568 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 91 PID 4052 wrote to memory of 4568 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 91 PID 4052 wrote to memory of 3044 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 92 PID 4052 wrote to memory of 3044 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 92 PID 4052 wrote to memory of 3044 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 92 PID 4052 wrote to memory of 3820 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 93 PID 4052 wrote to memory of 3820 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 93 PID 4052 wrote to memory of 3820 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 93 PID 3820 wrote to memory of 2368 3820 cmd.exe 94 PID 3820 wrote to memory of 2368 3820 cmd.exe 94 PID 3820 wrote to memory of 2368 3820 cmd.exe 94 PID 4052 wrote to memory of 1740 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 95 PID 4052 wrote to memory of 1740 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 95 PID 4052 wrote to memory of 1740 4052 266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe 95 PID 1740 wrote to memory of 548 1740 cmd.exe 96 PID 1740 wrote to memory of 548 1740 cmd.exe 96 PID 1740 wrote to memory of 548 1740 cmd.exe 96 PID 548 wrote to memory of 2732 548 cmd.exe 97 PID 548 wrote to memory of 2732 548 cmd.exe 97 PID 548 wrote to memory of 2732 548 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c echo olha > C:\Users\Admin\AppData\Local\Temp\blomaisatualmentee.txt2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo olha3⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe3⤵PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe3⤵PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\jumperr.exe /nogui C:\systemX86.txt2⤵PID:4568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\msnmsgsr.exe2⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"3⤵
- Adds Run key to start application
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "shutdown -r -f -t 10 -c "Erro Interno do Windows"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "shutdown -r -f -t 10 -c "Erro Interno do Windows"3⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -f -t 10 -c "Erro Interno do Windows4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394f055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1316