Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 12:31
Behavioral task
behavioral1
Sample
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
-
Size
16KB
-
MD5
392009369ac02872c00d5788bd4b54f1
-
SHA1
157aeec75ca30d24390e4fd05c73423079b5d46c
-
SHA256
291fdaaeab80921636014b48631f3e9da3951fc9d182e7caccbd04353ac69156
-
SHA512
5f782eb98ee2cb0a2a57a107cc77b0c9e542779ea0cf3f3fce5e51208891dbde014a021d32c8b4030dcca10f146a51244a3d9c708884e9c347170deeaace3e59
-
SSDEEP
384:fafW0r8AFh0ROrwHHr1zZgKh0s1XT7I85pQqvW0r:i/iR+wLdTd51
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a0000000120d5-5.dat acprotect -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
resource yara_rule behavioral1/memory/1716-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/files/0x000a0000000120d5-5.dat upx behavioral1/memory/1716-7-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mst122.dll 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mst122.dll 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\PROTOCOLS\Filter 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\PROTOCOLS\Filter\text/html\CLSID = "{827f2a6d-a347-455e-a986-ec4c44a6a117}" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{827f2a6d-a347-455e-a986-ec4c44a6a117}\InProcServer32 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{827f2a6d-a347-455e-a986-ec4c44a6a117}\InProcServer32\ThreadingModel = "Apartment" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\PROTOCOLS\Filter\text/html 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\PROTOCOLS\Filter\text/html\ = "Microsoft Default HTML MIME Filter" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{827f2a6d-a347-455e-a986-ec4c44a6a117} 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\CLSID\{827f2a6d-a347-455e-a986-ec4c44a6a117}\InProcServer32\ = "C:\\Windows\\SysWow64\\mst122.dll" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\PROTOCOLS 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 336 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 28 PID 1716 wrote to memory of 336 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 28 PID 1716 wrote to memory of 336 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 28 PID 1716 wrote to memory of 336 1716 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\392009~1.EXE > nul2⤵PID:336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e7099c7955ecff1b54c63cbf3154a6cc
SHA19514003c593fb941e6c17b003d7561e6a03300ea
SHA2565b2c21b368f533b480a81163048857462b90cd506c254a6aad7dbdabd0fbdcb6
SHA512d04e78f9100b20efbb65603378da95de5db4df12eeac5080f0586162f528d9da6d834305bfd3729e528be32f827f5217175cf96602b19b9939993607b4e7b0f0