Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 05:10
Behavioral task
behavioral1
Sample
4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe
-
Size
546KB
-
MD5
4ceb9451c3ede11246d08cc9d5606093
-
SHA1
2405d6c7e5fd5cbeebc4b591e2ac7a428f332b38
-
SHA256
ad7e4d3fc13a95f15f6c6049593deed025bcd1a2db09a131c73348ff9d28d450
-
SHA512
17fe6a979715e3f5ad2e975f2d6a34fd11280364a44346a1e48c1bed15ea6d4df2c3771ee36aed074a7ac8769f1746479749c7db05f5488810523bda9f62184c
-
SSDEEP
12288:UM5DSN6aAH0XNp7gGpWa7U8oico9hJMBex+gQL05:UM5D18NpEGZNVlxnF5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 lsass.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/files/0x0008000000017131-3.dat upx behavioral1/memory/3012-10-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/2392-8-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-19-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-20-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-21-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-22-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-23-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-25-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-26-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-27-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-28-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-29-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-30-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-31-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-32-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral1/memory/3012-33-0x0000000000400000-0x00000000004B1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\run32 = "C:\\Win\\lsass.exe" lsass.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\q: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\v: lsass.exe File opened (read-only) \??\x: lsass.exe File opened (read-only) \??\e: lsass.exe File opened (read-only) \??\g: lsass.exe File opened (read-only) \??\i: lsass.exe File opened (read-only) \??\u: lsass.exe File opened (read-only) \??\a: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\l: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\v: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\x: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\a: lsass.exe File opened (read-only) \??\p: lsass.exe File opened (read-only) \??\t: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\y: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\j: lsass.exe File opened (read-only) \??\t: lsass.exe File opened (read-only) \??\u: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\n: lsass.exe File opened (read-only) \??\q: lsass.exe File opened (read-only) \??\r: lsass.exe File opened (read-only) \??\e: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\g: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\i: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\r: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\s: lsass.exe File opened (read-only) \??\h: lsass.exe File opened (read-only) \??\k: lsass.exe File opened (read-only) \??\m: lsass.exe File opened (read-only) \??\o: lsass.exe File opened (read-only) \??\h: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\m: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\o: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\z: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\w: lsass.exe File opened (read-only) \??\y: lsass.exe File opened (read-only) \??\n: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\p: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\b: lsass.exe File opened (read-only) \??\l: lsass.exe File opened (read-only) \??\z: lsass.exe File opened (read-only) \??\j: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\k: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\s: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe File opened (read-only) \??\w: 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 5200310000000000e858a484122041707044617461003c0008000400efbee858a484e858a4842a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a00310000000000f0585129102054656d700000360008000400efbee858a484f05851292a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c00310000000000e858788c100041646d696e00380008000400efbee858a484e858788c2a0000002e000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = a200310000000000f058512917203443454239347e3100008a0008000400efbef0585129f05851292a0000007f22010000000c000000000000000000000000000000340063006500620039003400350031006300330065006400650031003100320034003600640030003800630063003900640035003600300036003000390033005f004a006100660066006100430061006b0065007300310031003800000018000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c00310000000000e8582a8610204c6f63616c00380008000400efbee858a484e8582a862a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7400310000000000e858a4841100557365727300600008000400efbeee3a851ae858a4842a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 lsass.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2688 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2688 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2688 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2688 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 30 PID 2392 wrote to memory of 3012 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 32 PID 2392 wrote to memory of 3012 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 32 PID 2392 wrote to memory of 3012 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 32 PID 2392 wrote to memory of 3012 2392 4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ceb9451c3ede11246d08cc9d5606093_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\4ceb9451c3ede11246d08cc9d5606093_JaffaCakes1182⤵PID:2688
-
-
\??\c:\Win\lsass.exec:\Win\lsass.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
PID:3012
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
546KB
MD54ceb9451c3ede11246d08cc9d5606093
SHA12405d6c7e5fd5cbeebc4b591e2ac7a428f332b38
SHA256ad7e4d3fc13a95f15f6c6049593deed025bcd1a2db09a131c73348ff9d28d450
SHA51217fe6a979715e3f5ad2e975f2d6a34fd11280364a44346a1e48c1bed15ea6d4df2c3771ee36aed074a7ac8769f1746479749c7db05f5488810523bda9f62184c