Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe
-
Size
263KB
-
MD5
5e5c8a51a66c6981e7794a50203f163c
-
SHA1
5feb29a8ff41671b9f311d3cebce929633381836
-
SHA256
40b60e75da32b813ea51c31f89957ca993e7d26ca0b6f0765a9962606aeadad7
-
SHA512
e6ed58678f51f2633a37ce16c687bda914ce0ff1fcac9aa48b29335c7a14bd4352ba95be067b9d1bc5da3955e69827ce707cb57bec67c67a26236e8c9b0f4501
-
SSDEEP
6144:oLPg4TMDxlAOnv7++4Uo+bhfpD44DeZNWLSl/:yTMDbJ42PhD0WLS
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2072 mcm.exe -
Executes dropped EXE 1 IoCs
pid Process 2072 mcm.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe Token: SeShutdownPrivilege 2172 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe 2172 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2072 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2072 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2072 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2072 2524 5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\mcm.exe"C:\Users\Admin\AppData\Local\mcm.exe" -gav C:\Users\Admin\AppData\Local\Temp\5e5c8a51a66c6981e7794a50203f163c_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2072
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5157e855f5429c3fd19adec38297a16f3
SHA1237c3863ab5a065dda102e6a4f5a1673b82ff7a6
SHA256a87c41bbc834659563f153dda23a8c09494e10c9ac7169ab99ac8c7eaf1d8ea8
SHA51293d51c8144ef5f80354a6d816e35d80453ac6a8dcd250ca45d76241d3f1ce77c24c1507a50f53b4a928b10abd0c0d26bfaf30faa6197b4c1c962eff6ce165672