Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe
-
Size
128KB
-
MD5
44878b1ceb3910b218423dab7eaae748
-
SHA1
00f762f28a0c95f7cfd2cdd25e12aff3490eddea
-
SHA256
50fd743d51c51a9b7f11731a304d920072b7d1f4e451933d1b9d2ef36e88c0dd
-
SHA512
70e398cbc2e0475af735e5fa56982d1bab6ec6ceee19bd2a1b81daccdd0435ff294342ba715e1bcbfb23c46c644f3d35f6c9b1477c5a6b5d706eeea5641c3d40
-
SSDEEP
3072:3qUVPQ5dN+Ho4xiE6wAFtaQFBNWAT9IJXvbjwmEUv3:JVI9+HohE2aQFBUvbjw8
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mcshield.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnipeSword.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVXP.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavmonD.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVXP.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Msconfig.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnipeSword.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mcshield.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ravmon.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfwsvc.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpdaterUI.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TBMon.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvMonXP.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FrogAgent.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TBMon.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Msconfig.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\naPrdMgr.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvMonXP.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VsTskMgr.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwproxy.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavmonD.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\katmain.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpdaterUI.exe\debugger = "wscntfy" 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 0.exe -
Executes dropped EXE 4 IoCs
pid Process 4440 0.exe 1380 a.EXE 2140 z.exe 4264 z.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a.EXE -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\z.exe z.exe File opened for modification C:\Windows\SysWOW64\z.exe z.exe File created C:\Windows\SysWOW64\00026906.dll z.exe File opened for modification C:\Windows\SysWOW64\00026906.dll z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4264 z.exe 4264 z.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4264 z.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 412 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 412 wrote to memory of 4440 412 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe 85 PID 412 wrote to memory of 4440 412 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe 85 PID 412 wrote to memory of 4440 412 44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe 85 PID 4440 wrote to memory of 1380 4440 0.exe 87 PID 4440 wrote to memory of 1380 4440 0.exe 87 PID 4440 wrote to memory of 1380 4440 0.exe 87 PID 4440 wrote to memory of 440 4440 0.exe 88 PID 4440 wrote to memory of 440 4440 0.exe 88 PID 4440 wrote to memory of 440 4440 0.exe 88 PID 1380 wrote to memory of 2140 1380 a.EXE 90 PID 1380 wrote to memory of 2140 1380 a.EXE 90 PID 1380 wrote to memory of 2140 1380 a.EXE 90 PID 4264 wrote to memory of 620 4264 z.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44878b1ceb3910b218423dab7eaae748_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\a.EXE"C:\Users\Admin\AppData\Local\Temp\a.EXE"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DeL!.bAt3⤵PID:440
-
-
-
C:\Windows\SysWOW64\z.exeC:\Windows\SysWOW64\z.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD50c1501fc79a3d4aacc5e23e734f90576
SHA1906dd77f15146e05ec7fe301b54de8b79a1ea903
SHA256e183ef51bd9a58f7f16233291b309ce00effb7dcefbd9d3bf17d9f27035b3e6b
SHA512cca67163cf755c5aa6f3ca88d2f1781219faf10fe625969b01d1f29e0c14d418e36e131c65640be771322d2a7664b87a432d64bca73363ca9feed177f1adf7f5
-
Filesize
17KB
MD54a9b7155e044df26b3a4a868dd1234c5
SHA113fbea1b97b51a090ca04bf72689ad2069735cdc
SHA2563dcef37e533f7f5ba38540214c4fe824b13b5ed0be2c2ea54ccc9be112cf08c0
SHA512f65b45f2859fe0d4e2c0783ae192565c9d7acbaa344a1744a6ab1704d848b953a6e696e233b9e84804e2f4c2342aa551c7fc3d6f7d0cc4860b2ac11b22af5d6e
-
Filesize
76KB
MD5a2174af04381d11dd1e19cafbbf281e5
SHA195d9245d97c59c1f6c408322d9f7298194d34a1e
SHA256ed2158130aa5c40a5ce0805737e6cb8ef312388cd25fc30f03b8a1fbb98fe92e
SHA512243802ef46b0b757882f0e691aa8fdec91c8ac9dee2fa82ce419d0dc268476122a870f95a796deb1453771154ef07e99a95b75bbd8c6ec98747e5a120c30bb84
-
Filesize
128B
MD5d9c49686033024152395358ce66e9ac4
SHA113d99d1a84aa97d9701bfe43074421b9b46a7ca6
SHA256bc88ca306af6562ace28f7760e3f70f0fee62b5f2427141d67951c421672f569
SHA512c3cf4367f8e6ed05163b2b62d1ffd8594271cef574c6d98c12694832554de274cb484ce860bbe35cc5682d359a46fd0034ce1b07a25e041c6fb52d22ad2c84e9
-
Filesize
30KB
MD59caddeab7b181eed6211cd788aee31e4
SHA1b8ad1559598ba3cbc334e3219f8eeeb60bf5acea
SHA2560c7664066645e338a019dbaa0d7913e388e11c6380e81d667827b67eba26a938
SHA51217cfb2d7f991d0935f13e2b288827a00f246eb8e00c2519c042844d6b2bf6ef100394b1d89813256948b9a0b0ade3bf0f37bf243cb0b037d27bf94ab39c0b5fc