Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
5a62ed380b979507e849a190c2146894_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a62ed380b979507e849a190c2146894_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5a62ed380b979507e849a190c2146894_JaffaCakes118.exe
-
Size
328KB
-
MD5
5a62ed380b979507e849a190c2146894
-
SHA1
79d08c54eaab3e6cea054a7365d23075d0acc580
-
SHA256
01df08aaf6177ee7e2a4c9389c10be0ebc5f8675e80e000f4dc4edb34334bf44
-
SHA512
d610ad7370bbbe70ff35418e5d72676a5198c355af7af6db80d0dc1136efe9f85925f370cecc933b920c4a6f2f1738870059718bb9c4e2209a2a19aa8520023f
-
SSDEEP
6144:wqJbiJMuADeTxa1Fy9zaCjWcqVGAcdsBzj9AOHf6kogFD:wqpjuA6Tw2jeokDfVoAD
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1716 hcu.exe -
Executes dropped EXE 1 IoCs
pid Process 1716 hcu.exe -
Loads dropped DLL 1 IoCs
pid Process 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\hcu.exe\" -a \"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\Content Type = "application/x-msdownload" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\DefaultIcon hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\ = "Application" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\DefaultIcon\ = "%1" hcu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" hcu.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\start\command hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\Content Type = "application/x-msdownload" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\runas\command hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start hcu.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\DefaultIcon\ = "%1" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\open\command hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\hcu.exe\" -a \"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\runas hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\ = "Application" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\DefaultIcon hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\DefaultIcon hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" hcu.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\open hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\hcu.exe\" -a \"%1\" %*" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\ = "exefile" hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\Content Type = "application/x-msdownload" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile hcu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\exefile\DefaultIcon\ = "%1" hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell hcu.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.exe\shell\start hcu.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 1716 hcu.exe 1716 hcu.exe 1716 hcu.exe 1716 hcu.exe 1716 hcu.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2324 explorer.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: 33 828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 828 AUDIODG.EXE Token: 33 828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 828 AUDIODG.EXE Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe Token: SeShutdownPrivilege 2324 explorer.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1716 hcu.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 1716 hcu.exe 2324 explorer.exe 2324 explorer.exe 1716 hcu.exe 1716 hcu.exe 2324 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 1716 hcu.exe 1716 hcu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1716 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 29 PID 1476 wrote to memory of 1716 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 29 PID 1476 wrote to memory of 1716 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 29 PID 1476 wrote to memory of 1716 1476 5a62ed380b979507e849a190c2146894_JaffaCakes118.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a62ed380b979507e849a190c2146894_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a62ed380b979507e849a190c2146894_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\hcu.exe"C:\Users\Admin\AppData\Local\hcu.exe" -gav C:\Users\Admin\AppData\Local\Temp\5a62ed380b979507e849a190c2146894_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1716
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5941⤵
- Suspicious use of AdjustPrivilegeToken
PID:828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD55a62ed380b979507e849a190c2146894
SHA179d08c54eaab3e6cea054a7365d23075d0acc580
SHA25601df08aaf6177ee7e2a4c9389c10be0ebc5f8675e80e000f4dc4edb34334bf44
SHA512d610ad7370bbbe70ff35418e5d72676a5198c355af7af6db80d0dc1136efe9f85925f370cecc933b920c4a6f2f1738870059718bb9c4e2209a2a19aa8520023f