Analysis
-
max time kernel
3s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 20:32
Behavioral task
behavioral1
Sample
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Errors
General
-
Target
2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe
-
Size
10KB
-
MD5
2db493c02c679809e9897ae8279f7579
-
SHA1
54cab9768a353681f36e34ff3be9dcdf3a1f402f
-
SHA256
deb6ee791144ab6d31fa6ca71efe1f9169fd0834b985596a2704778ab43115b8
-
SHA512
2eec1784fbbd77a43042ae759bdff527b05d6971e0684f907877a687e330088c9b5a0660308970d3914922915a4820ac4f277d34a148fa6b51959eaaa0b497f3
-
SSDEEP
192:7gc9THovq3VGytSGCSylrKFaNJhLkwcud2DH9VwGfct8+MUZnhG:r9Mvq3VGytSDmaNJawcudoD7UvbZnhG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 b2e.exe -
resource yara_rule behavioral2/memory/3628-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3628-10-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "150" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3528 shutdown.exe Token: SeRemoteShutdownPrivilege 3528 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3136 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2392 3628 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 84 PID 3628 wrote to memory of 2392 3628 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 84 PID 3628 wrote to memory of 2392 3628 2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe 84 PID 2392 wrote to memory of 2496 2392 b2e.exe 86 PID 2392 wrote to memory of 2496 2392 b2e.exe 86 PID 2392 wrote to memory of 2496 2392 b2e.exe 86 PID 2496 wrote to memory of 3528 2496 cmd.exe 89 PID 2496 wrote to memory of 3528 2496 cmd.exe 89 PID 2496 wrote to memory of 3528 2496 cmd.exe 89 PID 2392 wrote to memory of 2752 2392 b2e.exe 91 PID 2392 wrote to memory of 2752 2392 b2e.exe 91 PID 2392 wrote to memory of 2752 2392 b2e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\EB3B.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\2db493c02c679809e9897ae8279f7579_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ECA2.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 14⤵
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:2752
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3991855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD52d8e1e29c72b0dd98e33b1d5576b08c9
SHA176d537c192dedc56e98e6ac630e2b68d1352e637
SHA256108fb34ffb70076137698eb27199d6f879f67d0cc5545e66c2c34a389b6630c4
SHA5127d0e7b1d125ee225ad46247eec3ca397158d43a2c154c431d0e8bc41002e239d63bc9e43bab0c9f08f3daf81b8728c79f348e44e8ee535e2eeddb6f0a4fbc360
-
Filesize
16B
MD52a29cccbdf814e8c419a200110e51b54
SHA1bb4c5452045ba6f9d6fd71c8824b582bb8426c56
SHA256f1d0b882ca3a6dea35224c0d41d59a19d9be3cee6d7306d0f2df3e1a14170c32
SHA51205915e6c06126f62fa34257c51a6be47e70c257f41199fb8aabaaa768fde3dc6b38c8d37e4677f70fccda62232cb8f0bc284558713410a3cabce749533ba3c18
-
Filesize
158B
MD56666d3efa269690b223bd24b6387d54f
SHA1dd6d2384b16c6006d129fdd9898044893b9c66d2
SHA256cfd5028e6dfa7569073b5642af9e267e7503d24dd84f6e0a821321a39003df4f
SHA512c6ec714a86bb2445629dcc2692d3d6859ab754ddc723cb83b07e129a2a3d18676aed27ae5a1956ddf21d3fdf231a6cb7c51ed7cea84717bd34797df1162e551d