Analysis
-
max time kernel
146s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe
-
Size
392KB
-
MD5
4912b8acc123b550d9507a4bc6fa973c
-
SHA1
8ad09976a6a390a9a7e255cd1ea2439f5e7651f2
-
SHA256
4d71d139ef09faf92544bb8e47cbe3de2d3648757868f68b39c8ee6bb90d6e0f
-
SHA512
3bc4f44cfd7fe98eb1d8833bb3297872e95cadede1fef176939e3c04a22d2692bc2224715de75096e0c0bd706d872c4557c86f94d08d48d1935bee92db6c3395
-
SSDEEP
12288:uyGGmLdw5YRXnFb4iiXJo/VqiGFIG2oNwaaPI:/GGEdwORVb4iiX2tzGyG2oB
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000BD86DB4EB2331 = "C:\\ProgramData\\043A6AEB00014973000BD86DB4EB2331\\043A6AEB00014973000BD86DB4EB2331.exe" 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2152 043A6AEB00014973000BD86DB4EB2331.exe 2152 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2152 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2152 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2152 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 29 PID 2400 wrote to memory of 2152 2400 4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe"C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\4912b8acc123b550d9507a4bc6fa973c_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD54912b8acc123b550d9507a4bc6fa973c
SHA18ad09976a6a390a9a7e255cd1ea2439f5e7651f2
SHA2564d71d139ef09faf92544bb8e47cbe3de2d3648757868f68b39c8ee6bb90d6e0f
SHA5123bc4f44cfd7fe98eb1d8833bb3297872e95cadede1fef176939e3c04a22d2692bc2224715de75096e0c0bd706d872c4557c86f94d08d48d1935bee92db6c3395