Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe
-
Size
336KB
-
MD5
606385a2e6cfbb68a58914ffa95a8c15
-
SHA1
2d31695673e4fa7c1e090b14a93d2b982f05a4e2
-
SHA256
ee74cc755314a258d1f581521843673fdd2e5ccbc38f7f5383975828ac741ca9
-
SHA512
e117c245358f215027966875e0293bef9783699e47ce5e33be7e8bd0326310abfcfba9596e3a0ac0e2c3675cd9b7a510b1457f79bec6cffc47195a3968e1d5f9
-
SSDEEP
6144:Pe1ti+Fq9VR1umcY2LXad+1soDtJvQYwO136DtlAoaUfY/vaB5J/pyT:8iCaR1oad+dDtZb1mpfY/vq
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2440 kgg.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 kgg.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\ = "Application" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\DefaultIcon\ = "%1" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\DefaultIcon kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kgg.exe\" -a \"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\Content Type = "application/x-msdownload" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas kgg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" kgg.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\DefaultIcon\ = "%1" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\DefaultIcon\ = "%1" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\ = "Application" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\ = "exefile" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kgg.exe\" -a \"%1\" %*" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\Content Type = "application/x-msdownload" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\start kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\start\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\DefaultIcon kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" kgg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\Content Type = "application/x-msdownload" kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\runas\command kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start kgg.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\DefaultIcon kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\kgg.exe\" -a \"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" kgg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" kgg.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 2440 kgg.exe 2440 kgg.exe 2440 kgg.exe 2440 kgg.exe 2440 kgg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2440 kgg.exe 2440 kgg.exe 2440 kgg.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2440 kgg.exe 2644 explorer.exe 2644 explorer.exe 2440 kgg.exe 2440 kgg.exe 2644 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2440 kgg.exe 2440 kgg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 kgg.exe 2440 kgg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2440 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2440 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2440 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2440 2452 606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\kgg.exe"C:\Users\Admin\AppData\Local\kgg.exe" -gav C:\Users\Admin\AppData\Local\Temp\606385a2e6cfbb68a58914ffa95a8c15_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5606385a2e6cfbb68a58914ffa95a8c15
SHA12d31695673e4fa7c1e090b14a93d2b982f05a4e2
SHA256ee74cc755314a258d1f581521843673fdd2e5ccbc38f7f5383975828ac741ca9
SHA512e117c245358f215027966875e0293bef9783699e47ce5e33be7e8bd0326310abfcfba9596e3a0ac0e2c3675cd9b7a510b1457f79bec6cffc47195a3968e1d5f9