Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe
-
Size
262KB
-
MD5
3993696c0cc918c566ad9c89b5be2593
-
SHA1
c119e09a1ab2a2d5aeccc588d0406a4ee5f16f7a
-
SHA256
7c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96
-
SHA512
9b0d289c69c9d4e93779d1b82e9442f851e1ca2f2fd73e25192c6944cf5f52321509fe9f07553808a59bef5a2c851c384057d3b206045090ffef6b632d129ca5
-
SSDEEP
6144:tJXQh6uTjQ4rVmh3k4cSbgzsdrVRRetrEpsKHAK3g3UHYTvLRUQSOObAIASgrtH0:fOJcsgHoRIDCzc
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
themomentoftruth
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run audiodgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation audiodgi.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1376 svchost.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe wmpmetwk.exe File created C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe wmpmetwk.exe -
Executes dropped EXE 5 IoCs
pid Process 1376 svchost.exe 4740 svchost.exe 1780 audiodgi.exe 548 wmpmetwk.exe 3580 wmpmetwk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1376 set thread context of 4740 1376 svchost.exe 87 PID 548 set thread context of 3580 548 wmpmetwk.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3728 4740 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1376 svchost.exe 1780 audiodgi.exe 548 wmpmetwk.exe 1376 svchost.exe 1780 audiodgi.exe 548 wmpmetwk.exe 1376 svchost.exe 1780 audiodgi.exe 548 wmpmetwk.exe 1376 svchost.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 1780 audiodgi.exe 548 wmpmetwk.exe 1376 svchost.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 1780 audiodgi.exe 3580 wmpmetwk.exe 548 wmpmetwk.exe 1376 svchost.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe 3580 wmpmetwk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1924 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe Token: SeDebugPrivilege 1376 svchost.exe Token: SeDebugPrivilege 1780 audiodgi.exe Token: SeDebugPrivilege 548 wmpmetwk.exe Token: SeDebugPrivilege 3580 wmpmetwk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3580 wmpmetwk.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1376 1924 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe 86 PID 1924 wrote to memory of 1376 1924 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe 86 PID 1924 wrote to memory of 1376 1924 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe 86 PID 1376 wrote to memory of 4740 1376 svchost.exe 87 PID 1376 wrote to memory of 4740 1376 svchost.exe 87 PID 1376 wrote to memory of 4740 1376 svchost.exe 87 PID 1376 wrote to memory of 4740 1376 svchost.exe 87 PID 1376 wrote to memory of 1780 1376 svchost.exe 91 PID 1376 wrote to memory of 1780 1376 svchost.exe 91 PID 1376 wrote to memory of 1780 1376 svchost.exe 91 PID 1780 wrote to memory of 548 1780 audiodgi.exe 92 PID 1780 wrote to memory of 548 1780 audiodgi.exe 92 PID 1780 wrote to memory of 548 1780 audiodgi.exe 92 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93 PID 548 wrote to memory of 3580 548 wmpmetwk.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 844⤵
- Program crash
PID:3728
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"3⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3580
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87B
MD5c5ddc70af709b8c36260a10e9d37be9e
SHA14494984a1968a6053068d73d27de75a66c17f7cf
SHA25639e1cea64f487ab34ed56c9164c90330d224dbd0ddc314beb657909420eb96ff
SHA5123da0de610e81b05a7245851848e961326095b962ef1d37e212b37edf70256a526fbe8d58abedb2ada3141f858936a1fecba35f4909c1c98bc03dbe9e54736ec7
-
Filesize
7KB
MD52e18e07194565987ef816f36c4a2134e
SHA15278b14dc0704abd700264bb9f8610caf5d007eb
SHA25644c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA5127160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930
-
Filesize
262KB
MD53993696c0cc918c566ad9c89b5be2593
SHA1c119e09a1ab2a2d5aeccc588d0406a4ee5f16f7a
SHA2567c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96
SHA5129b0d289c69c9d4e93779d1b82e9442f851e1ca2f2fd73e25192c6944cf5f52321509fe9f07553808a59bef5a2c851c384057d3b206045090ffef6b632d129ca5