Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe
-
Size
320KB
-
MD5
60da1722cbd6ed279d13ded4723ec1cb
-
SHA1
38a38b90f548d084f2973aec5b83b8e2e2d130e7
-
SHA256
948e2fa4d771cc7b1332f734fe8b06188761a06865586744b974901028c67f5f
-
SHA512
33ceb4e348c8aee3fa03df74f8ba8bfd8dbf5f632151107597a354fc0cce4803c61536d0e9ccc11e928bba8c4f3ca7afab56eed7a541ebc27c232edf1c067568
-
SSDEEP
6144:48N4AgX0BUhBo0zxov3hAxqVvb47o7H7Qbr4y:bucAo0zxovxAEVm9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 3012 oom.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 oom.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe Token: SeShutdownPrivilege 2668 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe 2668 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3012 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 30 PID 2848 wrote to memory of 3012 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 30 PID 2848 wrote to memory of 3012 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 30 PID 2848 wrote to memory of 3012 2848 60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\oom.exe"C:\Users\Admin\AppData\Local\oom.exe" -gav C:\Users\Admin\AppData\Local\Temp\60da1722cbd6ed279d13ded4723ec1cb_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:3012
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD53ad2adabc7852d6bbd8e05a0c1172351
SHA1fb04c11ef326c5ba0337eaed76002b3e1d4ccbfe
SHA256617e343278f94c7c4b07e2135f568e5d7f229f39169f023a35200cb33d9dff35
SHA5122c575e5c0ca140060eb92e7985304de81e4da354af2491ee62bb55e6b85184fd084859614e37cbbe17dd73d8394f1c80f809d79e560b951eb98bfda20257dd3a