Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe
-
Size
998KB
-
MD5
29a8e816886abe7054f5600210d040a1
-
SHA1
d5134831d99701195f0fecc30cc8ee8b891802cc
-
SHA256
78a86d7921674b126d4a3e5e6513059cf75a847dee3e409a09f083c2d3376f78
-
SHA512
d778dbedfaf1226a9b81960b4027ef040442391a38ae4132f11247814fa1772adf0d99389a2ced12faa91bcb706efd4b0a027d527a820ce42380bb7f75093770
-
SSDEEP
24576:IedqEi/4uK3Jfe+8PcAPiIhQk76kNil8FkC49GyJve4eg6pPhBLD:Ie81b9Fueg6PV
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\isass.exe = "\"C:\\Users\\Admin\\AppData\\Local\\isass.exe \"" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 isass.exe -
Loads dropped DLL 6 IoCs
pid Process 4996 isass.exe 4996 isass.exe 4996 isass.exe 4996 isass.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000_Classes\Local Settings 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4292 reg.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4996 isass.exe 4996 isass.exe 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 4480 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4996 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 83 PID 1560 wrote to memory of 4996 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 83 PID 1560 wrote to memory of 4996 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 83 PID 1560 wrote to memory of 3424 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 86 PID 1560 wrote to memory of 3424 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 86 PID 1560 wrote to memory of 3424 1560 29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe 86 PID 3424 wrote to memory of 1228 3424 cmd.exe 88 PID 3424 wrote to memory of 1228 3424 cmd.exe 88 PID 3424 wrote to memory of 1228 3424 cmd.exe 88 PID 1228 wrote to memory of 4292 1228 cmd.exe 89 PID 1228 wrote to memory of 4292 1228 cmd.exe 89 PID 1228 wrote to memory of 4292 1228 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29a8e816886abe7054f5600210d040a1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\isass.exe"C:\Users\Admin\AppData\Local\isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c syscheck.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V isass.exe /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V isass.exe /D "\"C:\Users\Admin\AppData\Local\isass.exe \"" /f4⤵
- Adds policy Run key to start application
- Modifies registry key
PID:4292
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d3f3c14a20d4537a8287dfeeef397416
SHA1ac0f75053a5e72ee49eb570892f5a93efb06bfbd
SHA256589427c9fab1d3e2518f02c3186faf4dbcdbf3d741c7cdcac745b8935b768da5
SHA51204254a19c3f587d1f7f6dbe72e9c55b2bd40451e42244d49b7d14750bf2484e726dfcb7597ffd32c6d90610b0e5ed162ff5ce59973f232f9a45e1b1feab923dd
-
Filesize
416KB
MD5048b0f742fe03bf385d950d6a30c85d2
SHA1396a20288772c408e575e95e2e2634ce225bedb6
SHA25693ae50cba29f2a11971d15987537ae7eb43c6a5630d508dd10c84a22974c10d9
SHA512ef90df7454916018bb07ebf4299cd905bce0b06682f0dae04d4e05c3b7d74214c1d2940f3689086eefaa49c5b6b8e37a221c929f0a5e1e3fe5300ab791c5d6f1
-
Filesize
146KB
MD56df55f30130fbee51845413ba4b6e95a
SHA1f901765269f01a95807d248f00024941eef8a9fb
SHA25639c5114cb0342ae5c6703b4bb361f1709cd26961eb623bb242b4d74c273b42ce
SHA51296f79d673c599ec5cd63ca163472a9a2c306393354710f0f07215fd4ccf45096a5f53d510cb0ca00f5115ff10476e7fd905e9fa138950f3421000d61e3606224