Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe
-
Size
336KB
-
MD5
5a61f86a88fdcd68b86211d3ec64ebba
-
SHA1
0391dc1ab61ae07cf76527eaf57f37a3ac01d7a2
-
SHA256
68631627d2747e651071b9a791960702b4c4e9a7a8a9958b9751f9934f353089
-
SHA512
dfc316bc40c5657e9a37a0c826699a9525b6e82a4cbcc7ffec7cf018734b32a3e691b9b2af25e717cee2677dadea4b8c579cf730c5299686270c5ed496b50175
-
SSDEEP
6144:ClPGCL8nbBv+CgyaDCYGwaSbntNggvSACuZde9Yr:YP5LuR+CarGYL7ayde
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2860 raa.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 raa.exe -
Loads dropped DLL 2 IoCs
pid Process 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe Token: SeShutdownPrivilege 2684 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe 2684 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2860 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2860 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2860 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2860 2348 5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\raa.exe"C:\Users\Admin\AppData\Local\raa.exe" -gav C:\Users\Admin\AppData\Local\Temp\5a61f86a88fdcd68b86211d3ec64ebba_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2860
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5025085bcf5a4bead3b852c7f64fca2ae
SHA1d7f7196edd1591a1b4b53062b447878ad6b4fa9e
SHA256cfba6d292c0ca333d6589fc0461323669d104445cf748a92c2d01145708eacd7
SHA5128dfb701c69952f7d1d4a090cb2a7f84f976f318515642a47e333a46852a2de5393ca5ab1dbf2c99fb6c8154a8e7320cd9722092baa2fcde15624514d280b524a