Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe
-
Size
67KB
-
MD5
391e15cf35242aba9ee0b3c42a9029a1
-
SHA1
cb7797caa4d906b2a24319e33a91d667e50e8342
-
SHA256
fa5b5dad904a04f6337031cd7404e4574ead87742e4379f010a79bfde1ce83f9
-
SHA512
abfccd82126c1b97c921ced56114562ba3af9fd7f1cc25b3592868dd7cc55f85ff224ba630593c51aa6ea89c3ede64d49ee4671da87e37e564e7d85317761aad
-
SSDEEP
1536:BZOAINnO22uYIbCvm/rm7lrqIrXqh8de3y4p9ZHdp1MF8NM:BVc52OCiCBrqIr66qy49M
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Public\H-4535-6842-8537\winsvn32hg.exe = "C:\\Users\\Public\\H-4535-6842-8537\\winsvn32hg.exe:*:Enabled:Mnbivibi686" 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5020 winsvn32hg.exe 4772 winsvn32hg.exe -
Loads dropped DLL 2 IoCs
pid Process 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 5020 winsvn32hg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mnbivibi686 = "C:\\Users\\Public\\H-4535-6842-8537\\winsvn32hg.exe" 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 460 set thread context of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 5020 set thread context of 4772 5020 winsvn32hg.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 536 460 WerFault.exe 82 3300 5020 WerFault.exe 90 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 5020 winsvn32hg.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 460 wrote to memory of 3132 460 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 86 PID 3132 wrote to memory of 5020 3132 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 90 PID 3132 wrote to memory of 5020 3132 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 90 PID 3132 wrote to memory of 5020 3132 391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe 90 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91 PID 5020 wrote to memory of 4772 5020 winsvn32hg.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\391e15cf35242aba9ee0b3c42a9029a1_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Public\H-4535-6842-8537\winsvn32hg.exe"C:\Users\Public\H-4535-6842-8537\winsvn32hg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Public\H-4535-6842-8537\winsvn32hg.exe"C:\Users\Public\H-4535-6842-8537\winsvn32hg.exe"4⤵
- Executes dropped EXE
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 5804⤵
- Program crash
PID:3300
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 5802⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 460 -ip 4601⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5020 -ip 50201⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58c35f2cce4bbc1433b394b03d63b049f
SHA15ffb62edcaa630d2cc9d3c186a9e37e23921e8fa
SHA2563b91b98de32c74292d0109ca538a46a7d7093f8d88076a686fcecd93f3f124d0
SHA512ad6bc2331101bffa26676540afbeec4bb803e2ebb11af76ccf43b940d62fe4c9317179e51d57c64bd56ba21be9f8512d3b98092766c522f7e4a0ca091feb0315
-
Filesize
67KB
MD5391e15cf35242aba9ee0b3c42a9029a1
SHA1cb7797caa4d906b2a24319e33a91d667e50e8342
SHA256fa5b5dad904a04f6337031cd7404e4574ead87742e4379f010a79bfde1ce83f9
SHA512abfccd82126c1b97c921ced56114562ba3af9fd7f1cc25b3592868dd7cc55f85ff224ba630593c51aa6ea89c3ede64d49ee4671da87e37e564e7d85317761aad