Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
487893133b93c288b182603f26659829_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
487893133b93c288b182603f26659829_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
487893133b93c288b182603f26659829_JaffaCakes118.exe
-
Size
325KB
-
MD5
487893133b93c288b182603f26659829
-
SHA1
707de24143cfdd7fb371d896e00e4f60f67453f1
-
SHA256
cdcf2d76c363fe845cc3efae5518bd26d43964d54e50d9f80f6042cb0c59a8cf
-
SHA512
de986c27c9bbffbb9275ac4383565f2d14c4253bac093e15990ab2efb28523f523765d591cf2db11208b26ffc14d16e9331d6f0610af580ec63398e13062e6ab
-
SSDEEP
6144:AolT9FTDWLPMpZU0m4hZZPLQOculp6Pp44yc/3+U9oCC7D:A+T9sMLU0mcLQm6Pp4yuU2Cs
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2668 enw.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 enw.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2668 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2668 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2668 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2668 3040 487893133b93c288b182603f26659829_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\487893133b93c288b182603f26659829_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\487893133b93c288b182603f26659829_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\enw.exe"C:\Users\Admin\AppData\Local\enw.exe" -gav C:\Users\Admin\AppData\Local\Temp\487893133b93c288b182603f26659829_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2668
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5487893133b93c288b182603f26659829
SHA1707de24143cfdd7fb371d896e00e4f60f67453f1
SHA256cdcf2d76c363fe845cc3efae5518bd26d43964d54e50d9f80f6042cb0c59a8cf
SHA512de986c27c9bbffbb9275ac4383565f2d14c4253bac093e15990ab2efb28523f523765d591cf2db11208b26ffc14d16e9331d6f0610af580ec63398e13062e6ab