Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
4553748f300676873e21f4f5b1de46e0
-
SHA1
d073da1d10a9625ec3c5f2f8b546add37cf15af1
-
SHA256
9db4e53122eed4bba862ad50550232aff82e8d5de4706da219c4f7404191907a
-
SHA512
d98354f02e806ada99016aa0bc8ad8b8dc8ed39346e5c3b4ffd9dc2dfc97407db93fd4da2b4d9a525ac02a52c8b2df2a142a83d3fa5b59742c8b5271bd2b2101
-
SSDEEP
24576:pcs3MKLBDY7Ryy0fNRqTb+UO8lZN899ysIOmQuKa/57HaLtVDpEYfMoR:P1LBUPoj6tv49yL2Pa9SV7p
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 944 msiinst.exe 472 MsiExec.exe 2612 MsiExec.exe -
Loads dropped DLL 2 IoCs
pid Process 472 MsiExec.exe 2612 MsiExec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: MsiExec.exe File opened (read-only) \??\N: MsiExec.exe File opened (read-only) \??\P: MsiExec.exe File opened (read-only) \??\K: MsiExec.exe File opened (read-only) \??\V: MsiExec.exe File opened (read-only) \??\W: MsiExec.exe File opened (read-only) \??\X: MsiExec.exe File opened (read-only) \??\Y: MsiExec.exe File opened (read-only) \??\B: MsiExec.exe File opened (read-only) \??\G: MsiExec.exe File opened (read-only) \??\I: MsiExec.exe File opened (read-only) \??\L: MsiExec.exe File opened (read-only) \??\O: MsiExec.exe File opened (read-only) \??\Z: MsiExec.exe File opened (read-only) \??\A: MsiExec.exe File opened (read-only) \??\E: MsiExec.exe File opened (read-only) \??\J: MsiExec.exe File opened (read-only) \??\S: MsiExec.exe File opened (read-only) \??\T: MsiExec.exe File opened (read-only) \??\U: MsiExec.exe File opened (read-only) \??\M: MsiExec.exe File opened (read-only) \??\Q: MsiExec.exe File opened (read-only) \??\R: MsiExec.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msi.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\msimsg.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\mspatcha.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\usp10.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\shfolder.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\msiexec.exe MsiExec.exe File opened for modification C:\Windows\SysWOW64\cabinet.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\msls31.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\riched20.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\msihnd.dll MsiExec.exe File opened for modification C:\Windows\SysWOW64\Imagehlp.dll MsiExec.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Patch\shell\Open\ = "&Apply Patch" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Open\command\ = "\"C:\\Windows\\system32\\msiexec.exe\" /i \"%1\" %*" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Open\ = "&Install" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\ = "Open" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Repair\command\ = "\"C:\\Windows\\system32\\msiexec.exe\" /f \"%1\" %*" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Repair MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Repair\ = "Re&pair" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Uninstall\command\ = "\"C:\\Windows\\system32\\msiexec.exe\" /x \"%1\" %*" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.msp\ = "Msi.Patch" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Patch\ = "Open" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Patch\shell\Open\command MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Patch\shell\Open MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\.msi MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.msi\ = "Msi.Package" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Repair\command MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Uninstall\command MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shell\Uninstall\ = "&Uninstall" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Open\command MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Open MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Package\shell\Uninstall MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\.msp MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\Msi.Patch MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Patch\shell\Open\command\ = "\"C:\\Windows\\system32\\msiexec.exe\" /p \"%1\" %*" MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2612 MsiExec.exe Token: SeIncreaseQuotaPrivilege 2612 MsiExec.exe Token: SeSecurityPrivilege 3108 msiexec.exe Token: SeSecurityPrivilege 2612 MsiExec.exe Token: SeTakeOwnershipPrivilege 2612 MsiExec.exe Token: SeRestorePrivilege 2612 MsiExec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4648 wrote to memory of 944 4648 4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe 84 PID 4648 wrote to memory of 944 4648 4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe 84 PID 4648 wrote to memory of 944 4648 4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe 84 PID 944 wrote to memory of 472 944 msiinst.exe 85 PID 944 wrote to memory of 472 944 msiinst.exe 85 PID 944 wrote to memory of 472 944 msiinst.exe 85 PID 944 wrote to memory of 2612 944 msiinst.exe 88 PID 944 wrote to memory of 2612 944 msiinst.exe 88 PID 944 wrote to memory of 2612 944 msiinst.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4553748f300676873e21f4f5b1de46e0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exe /i instmsi.msi /qb+2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MsiExec.exeMsiExec.exe /regserver3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MsiExec.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exe /i instmsi.msi /qb+3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51fff0ad0e5cbb7f910911b455d651eae
SHA1b657448eb7c2646d124c8c3d5f6a4c4bf36daa54
SHA2569aea91635605c1ed8f57d01030c4b173d7c894d742ac9c5c6784a8e3458f1105
SHA51269d09f8718663f38517e56768e284f8763ce2eb9fc3ce6e91250b209b7d64afa328f0a647891772c11e7bdec82cf679e55a04331cd339ab40b5cc4c89af194bc
-
Filesize
679KB
MD5528846710b84cf29b3fbae8b5a12e028
SHA1417e88f96cdb9effefb5ec8be020c36367674e40
SHA256706cc97d4aca7dee485d8de6d5f5e286a513bf11bca11fbf321430de760c7801
SHA5128174b1413b4db9e9347e114d1402aa34a80fcc616cc5c68273f2a36b4b4da21745d4956bf9808bd9516bd0489b8defabcfe0da1f3a82f651d7db495636660353
-
Filesize
680KB
MD5637320b4d6a81f21edb5f45abd1d02fa
SHA1ea0b4081bcccbf797c32172fafa5bd732b61acec
SHA25634e6013cd82abd7f5fc1879c3f27b10899bdf3833bf93cbb81d3eb72c3c62be3
SHA512662dff4d02ce4feac27cd378728428943a5b7fad30b71a2ffd9f38517b835c05bf48fc4bc59a24ce86a657b2eaf5ce00939ede1e2badbf39c3bb20d4d0d7df39
-
Filesize
46KB
MD54dd11f4fd21897f4629cb6e68b8d8b5b
SHA160df48206ad37cfacdd91d88d5614a78d7d843d6
SHA256b896a92bfd15a51e3c44e5a9131af437605376357abe44e28d101d35779b58d0
SHA512bfab354421b494fb0ccc3369e25b335d92c74973fd2393df1a1b8e56c547c88e6abf8364e559ff7ca998a13adddf5114638333d3cd0108cf12cee54702dc8d2f
-
Filesize
6KB
MD57499489b7d11eee16eff127a764a8f28
SHA1341d4e290537932cdeb2f3321f99d18a778220d0
SHA2564bae6fb6d6d4907d259959315f35e74c183f594e6f8145353377eb55162fb004
SHA512e8fdfc6abdc5e6bc26d467eafa71060cb06e4320b79e9ba8f8328c78aa58f5f42389d729b1e5d95454d67958f51d7361aac261e48498a2aeb1f31cb0e6a0caec