Analysis
-
max time kernel
32s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
30591db74612deece6de48de2b04bd52_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30591db74612deece6de48de2b04bd52_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Errors
General
-
Target
30591db74612deece6de48de2b04bd52_JaffaCakes118.exe
-
Size
151KB
-
MD5
30591db74612deece6de48de2b04bd52
-
SHA1
d2706052f4dd11b0bd5292d1057ea6bb6efdebcc
-
SHA256
5b648f3a7015a91ba238458bb5615facfbbb0e07fdc15e191dd2d834bfc819da
-
SHA512
656d5905fe5576cb33922bb3ed87c588ba78dfaa66945137cc72509a4ee715fde7e4fb8d89215507c998279ca8caa3310cd5339c5b550767b4f2ea026bced78d
-
SSDEEP
3072:uUR+SomDayputd21OoFNSUcnyoQ/FhMT65t1AlfxiVwYtis93Prvy:4SDDayp/dFhMT6L1S0icr6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Setms = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Update\\wnddx.exe" 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "106" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3588 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe 3588 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5052 shutdown.exe Token: SeRemoteShutdownPrivilege 5052 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 408 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 5052 3588 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe 84 PID 3588 wrote to memory of 5052 3588 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe 84 PID 3588 wrote to memory of 5052 3588 30591db74612deece6de48de2b04bd52_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\30591db74612deece6de48de2b04bd52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30591db74612deece6de48de2b04bd52_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" -r2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39be055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:408