Analysis
-
max time kernel
147s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe
-
Size
109KB
-
MD5
3e78a8d2667bf948082f7f6cad2c82f1
-
SHA1
627145099b8edbd8bebc33ffb0871e0104d5b9a3
-
SHA256
f712333bbc8b4c99b18a02aa2b4318bbf245d1f69c915f6470264a5c38d508c2
-
SHA512
6f9173a73c4fc8845c2eec2f90731b1f2977e10fa719d914dbe39ba536e9e1b7b77c31b8978d84954205bc71a1591732cb8d74e27e41c95fd0e30b6bbd65f45f
-
SSDEEP
1536:Rnqtu3abBGy3G8V0iuoKWGq6KfFkWGq6cjTA:RqRMPsKWGqFdkWGqzjTA
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" asct.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" asct.exe -
Executes dropped EXE 2 IoCs
pid Process 2660 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 3660 asct.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt asct.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" asct.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: asct.exe File opened (read-only) \??\Q: asct.exe File opened (read-only) \??\J: asct.exe File opened (read-only) \??\P: asct.exe File opened (read-only) \??\R: asct.exe File opened (read-only) \??\V: asct.exe File opened (read-only) \??\X: asct.exe File opened (read-only) \??\B: asct.exe File opened (read-only) \??\E: asct.exe File opened (read-only) \??\I: asct.exe File opened (read-only) \??\M: asct.exe File opened (read-only) \??\S: asct.exe File opened (read-only) \??\T: asct.exe File opened (read-only) \??\U: asct.exe File opened (read-only) \??\W: asct.exe File opened (read-only) \??\G: asct.exe File opened (read-only) \??\K: asct.exe File opened (read-only) \??\L: asct.exe File opened (read-only) \??\Z: asct.exe File opened (read-only) \??\H: asct.exe File opened (read-only) \??\O: asct.exe File opened (read-only) \??\Y: asct.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\maxtrox.txt 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt asct.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr asct.exe File created \??\c:\windows\SysWOW64\Desktop.sysm asct.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm asct.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification \??\c:\Program Files\7-Zip\7zG.exe asct.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe asct.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe asct.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe asct.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe asct.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\private_browsing.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe asct.exe File opened for modification \??\c:\Program Files\Windows Media Player\setup_wm.exe asct.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe asct.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe asct.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe asct.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe asct.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt asct.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon asct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command asct.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 3660 asct.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 83 PID 2904 wrote to memory of 2660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 83 PID 2904 wrote to memory of 2660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 83 PID 2904 wrote to memory of 3660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 85 PID 2904 wrote to memory of 3660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 85 PID 2904 wrote to memory of 3660 2904 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes118.exe2⤵
- Executes dropped EXE
PID:2660
-
-
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\asct.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\asct.exe" 3e78a8d2667bf948082f7f6cad2c82f1_JaffaCakes1182⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD59dbb82fb602aa42b131c55c5d136dc9c
SHA14f6d5c48f68b4a94b08960788b4660b8f6cf318d
SHA256ca656fda1f8fea01307a97156e105792a40eb2e1968c057643f4bb21e81738df
SHA512b1f5c52b7e7590625161bbe2f53dfd95bed88ab37b5ae31736c087f61e3b6a449bd782a18f028d869ac2dd9052f4d16254d89f746040f02f1608b5e5cad61328
-
Filesize
82KB
MD5785fa3efe7c6b97ccc072889e80395c4
SHA1bebc636bc298cb0173ff23c07a232043fa1a6874
SHA2568f23b9e5907cdb872898aa837b651c1d4ce8164f281b5aabbac6d79b3a228e23
SHA512b62a72ce397c433d3140d2b9fd25a9869bf75b4cb42c7a4acea1ef8fe5928aac2d221cf9e2ce4b66ab4a84b61d872ff0d493f83a6c44771f1600951a5d04b94f
-
Filesize
82KB
MD523f57851437bb2f7335ad3aad7461563
SHA1313368b3bbf0c4c40cab94cc18ed14c62c0e7d18
SHA256cf505b08b553ed98e7e34a0e03ffca42f62912942d995f15972e1e51faa513f6
SHA5125d34d4319f432d86627fc91c1addef99714002a35fc9690eedc385e1f5c9dff5ba5b289059755fc9e70d367bd587b041b592e5da4ace7f5de8d7a7a26f1d7dad
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062