Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe
-
Size
320KB
-
MD5
5b4393684f5e73ee975ca2055a01a9de
-
SHA1
8841b3e538e0468aaee09f5780f4b856f3905df1
-
SHA256
e741b9c24b5220a207af22642d7a4394ad2b4ba084aebd70f0a5a786889ff04d
-
SHA512
32b18ca2b5d9c8e9ac490341a8a063f0d947ee3f38a2a8d008274223a5e5c2d87200e3d7f76d160abe5937092b793f936e76479ecb1d489d52bc2cb6bae11fb3
-
SSDEEP
6144:nVKVsZdh5nNSzbJPrjL3gUlqI7t/eHcD5lni:qgd85XYAticD5k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2552 qrw.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 qrw.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 2552 qrw.exe 2764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2552 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2552 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2552 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2552 2420 5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\qrw.exe"C:\Users\Admin\AppData\Local\qrw.exe" -gav C:\Users\Admin\AppData\Local\Temp\5b4393684f5e73ee975ca2055a01a9de_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2552
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD55b4393684f5e73ee975ca2055a01a9de
SHA18841b3e538e0468aaee09f5780f4b856f3905df1
SHA256e741b9c24b5220a207af22642d7a4394ad2b4ba084aebd70f0a5a786889ff04d
SHA51232b18ca2b5d9c8e9ac490341a8a063f0d947ee3f38a2a8d008274223a5e5c2d87200e3d7f76d160abe5937092b793f936e76479ecb1d489d52bc2cb6bae11fb3