Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 12:31
Behavioral task
behavioral1
Sample
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe
-
Size
16KB
-
MD5
392009369ac02872c00d5788bd4b54f1
-
SHA1
157aeec75ca30d24390e4fd05c73423079b5d46c
-
SHA256
291fdaaeab80921636014b48631f3e9da3951fc9d182e7caccbd04353ac69156
-
SHA512
5f782eb98ee2cb0a2a57a107cc77b0c9e542779ea0cf3f3fce5e51208891dbde014a021d32c8b4030dcca10f146a51244a3d9c708884e9c347170deeaace3e59
-
SSDEEP
384:fafW0r8AFh0ROrwHHr1zZgKh0s1XT7I85pQqvW0r:i/iR+wLdTd51
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000800000002347f-5.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
resource yara_rule behavioral2/memory/3992-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x000800000002347f-5.dat upx behavioral2/memory/3992-8-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mst122.dll 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mst122.dll 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node\CLSID 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node\CLSID\{cf3b26fe-827a-4f34-a92b-28713b337768}\InProcServer32\ = "C:\\Windows\\SysWow64\\mst122.dll" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node\CLSID\{cf3b26fe-827a-4f34-a92b-28713b337768}\InProcServer32\ThreadingModel = "Apartment" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\PROTOCOLS\Filter\text/html 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\PROTOCOLS 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\PROTOCOLS\Filter 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\PROTOCOLS\Filter\text/html\ = "Microsoft Default HTML MIME Filter" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\PROTOCOLS\Filter\text/html\CLSID = "{cf3b26fe-827a-4f34-a92b-28713b337768}" 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node\CLSID\{cf3b26fe-827a-4f34-a92b-28713b337768}\InProcServer32 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\WOW6432Node\CLSID\{cf3b26fe-827a-4f34-a92b-28713b337768} 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4452 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 88 PID 3992 wrote to memory of 4452 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 88 PID 3992 wrote to memory of 4452 3992 392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\392009369ac02872c00d5788bd4b54f1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\392009~1.EXE > nul2⤵PID:4452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e7099c7955ecff1b54c63cbf3154a6cc
SHA19514003c593fb941e6c17b003d7561e6a03300ea
SHA2565b2c21b368f533b480a81163048857462b90cd506c254a6aad7dbdabd0fbdcb6
SHA512d04e78f9100b20efbb65603378da95de5db4df12eeac5080f0586162f528d9da6d834305bfd3729e528be32f827f5217175cf96602b19b9939993607b4e7b0f0