Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe
-
Size
468KB
-
MD5
4ae4d97bf49da34a1dfd43f3dce8d189
-
SHA1
1800b798c9c92dbafe59f7a763ff01d99ee8ea10
-
SHA256
a7aff18a7d73600327be6a4edb4ba1543bbffb265c0f94ec253a238b1665df52
-
SHA512
a0bf3ecbffd91ee7627c747d2cd378ec62ab2adfbda7d1288707b46c6e7b031b54a8ef18856bd8969061d036279169fd2a19dd57bda33e623b68b4cba347cff4
-
SSDEEP
12288:bb7jkD3v0VBRxE5MBGlcM7UdTMl7UZWG1j3FLiUhf:bb3w3v8BRqEM7UdcU1j35iI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 GHFHGJHNSSJDW.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 GHFHGJHNSSJDW.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GHFHGJHNSSJDW.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\GHFHGJHNSSJDW.exe 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe File created C:\Windows\HKFX2008.BAT 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe File created C:\Windows\GHFHGJHNSSJDW.exe 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" GHFHGJHNSSJDW.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48}\WpadDecisionReason = "1" GHFHGJHNSSJDW.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48}\WpadNetworkName = "Network 3" GHFHGJHNSSJDW.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-f3-e3-0f-5f-1c\WpadDecisionTime = 00cf7fcbe6d6da01 GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" GHFHGJHNSSJDW.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" GHFHGJHNSSJDW.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GHFHGJHNSSJDW.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48}\WpadDecision = "0" GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-f3-e3-0f-5f-1c GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-f3-e3-0f-5f-1c\WpadDecision = "0" GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48} GHFHGJHNSSJDW.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48}\WpadDecisionTime = 00cf7fcbe6d6da01 GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A393F264-E704-488B-87B4-3D2019419C48}\52-f3-e3-0f-5f-1c GHFHGJHNSSJDW.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-f3-e3-0f-5f-1c\WpadDecisionReason = "1" GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections GHFHGJHNSSJDW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings GHFHGJHNSSJDW.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix GHFHGJHNSSJDW.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe Token: SeDebugPrivilege 2936 GHFHGJHNSSJDW.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 GHFHGJHNSSJDW.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2988 2936 GHFHGJHNSSJDW.exe 31 PID 2936 wrote to memory of 2988 2936 GHFHGJHNSSJDW.exe 31 PID 2936 wrote to memory of 2988 2936 GHFHGJHNSSJDW.exe 31 PID 2936 wrote to memory of 2988 2936 GHFHGJHNSSJDW.exe 31 PID 3060 wrote to memory of 2892 3060 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2892 3060 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2892 3060 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2892 3060 4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ae4d97bf49da34a1dfd43f3dce8d189_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\HKFX2008.BAT2⤵
- Deletes itself
PID:2892
-
-
C:\Windows\GHFHGJHNSSJDW.exeC:\Windows\GHFHGJHNSSJDW.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD54ae4d97bf49da34a1dfd43f3dce8d189
SHA11800b798c9c92dbafe59f7a763ff01d99ee8ea10
SHA256a7aff18a7d73600327be6a4edb4ba1543bbffb265c0f94ec253a238b1665df52
SHA512a0bf3ecbffd91ee7627c747d2cd378ec62ab2adfbda7d1288707b46c6e7b031b54a8ef18856bd8969061d036279169fd2a19dd57bda33e623b68b4cba347cff4
-
Filesize
218B
MD5e14006e88b05a26a8520e1c67eb1a8c4
SHA19fbe96f9226b5d7db4a374f32a75e9ef09180d1c
SHA2562443f0d69aab332ca24d0c4ff9f4f1eadb2cd32ded800d207192254726d89b8f
SHA5123db3e72ac156f0c2c1b09295e85548964f6f3d831168199507250ed98863d06d5e6ca9f8829eb637e156db8ce205d9ae3275750e2658fcfbc921b4deb80cf162