Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe
-
Size
471KB
-
MD5
282807be952aca9e2a10d4b998dea99d
-
SHA1
deaa64423864b09383f24dd58fc24d694aa9cb92
-
SHA256
4c6d0b9e1fc3066b7421978fba95f7e6ce0463887ed953365b5cab4f4e16a9b0
-
SHA512
be53040a2a879bff60d64d947a987548df38873c062bbb2cff2d821460c7116817a75fce9f8488434f1a5c0c9035735ee756393443e217ade93fec1f4c6a53bc
-
SSDEEP
12288:+e6fM21Az3KwyGLHAzNQ3YL//LJNNDTPzNH7JV3Fcfk8rTvrLadrax8D+5axnfDF:+e6fNALKwf8zNQ3YL//LJNNDTPzNH7JB
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\svchost = "C:\\Windows\\system32\\svchost\\svchost.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\svchost = "C:\\Windows\\system32\\svchost\\svchost.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{L116JG07-148E-1TU2-60X2-0Y0NBU803HLL} iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{L116JG07-148E-1TU2-60X2-0Y0NBU803HLL}\StubPath = "C:\\Windows\\system32\\svchost\\svchost.exe Restart" iexplore.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\Windows\\system32\\svchost\\svchost.exe" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host Process for Windows Services = "C:\\Windows\\system32\\svchost\\svchost.exe" iexplore.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchost\svchost.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\svchost.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\plugin.dat iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3588 set thread context of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 vbc.exe 2136 vbc.exe 2136 vbc.exe 2136 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2136 vbc.exe Token: SeDebugPrivilege 2136 vbc.exe Token: SeDebugPrivilege 2136 vbc.exe Token: SeDebugPrivilege 2136 vbc.exe Token: SeDebugPrivilege 1436 iexplore.exe Token: SeDebugPrivilege 1436 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2136 3588 282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe 83 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86 PID 2136 wrote to memory of 1436 2136 vbc.exe 86
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1016
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3088
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3904
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:4008
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:516
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:2952
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1948
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2300
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2012
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2896
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4976
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:1292
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1052
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3376
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1200
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2328
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1424
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2772
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2804
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3508
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\282807be952aca9e2a10d4b998dea99d_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3344
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4328
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3324