Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
691fe56187db954430d1008fd42492a7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
691fe56187db954430d1008fd42492a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
691fe56187db954430d1008fd42492a7_JaffaCakes118.exe
-
Size
340KB
-
MD5
691fe56187db954430d1008fd42492a7
-
SHA1
c5d6818f408afd4818a22217cfffb00358793ea5
-
SHA256
ff269a9e38ba380ee8b748a888efe137791f865d8d48b9f018c4cab3771f8717
-
SHA512
67a52bdf25b88c8c0bb2264a39390a76a32d656f11ff8905e3c221f9fa4e038c5c21e31c9fc6629c91b1e62afd08cfc29acfd64356a93a835e8d03c89a8c5558
-
SSDEEP
6144:nPUo8E7o6YkJkOa1LlzSt90n+biGCjyVTKit9nRSTa/AW:nPUExna1h4a+PdoitBRSG/AW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2436 userinit.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\userinit.exe 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main userinit.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch userinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" userinit.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 2436 userinit.exe 2436 userinit.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2436 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2436 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2436 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2436 1708 691fe56187db954430d1008fd42492a7_JaffaCakes118.exe 31 PID 2436 wrote to memory of 2880 2436 userinit.exe 32 PID 2436 wrote to memory of 2880 2436 userinit.exe 32 PID 2436 wrote to memory of 2880 2436 userinit.exe 32 PID 2436 wrote to memory of 2880 2436 userinit.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\691fe56187db954430d1008fd42492a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\691fe56187db954430d1008fd42492a7_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\userinit.exe"C:\Windows\userinit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5691fe56187db954430d1008fd42492a7
SHA1c5d6818f408afd4818a22217cfffb00358793ea5
SHA256ff269a9e38ba380ee8b748a888efe137791f865d8d48b9f018c4cab3771f8717
SHA51267a52bdf25b88c8c0bb2264a39390a76a32d656f11ff8905e3c221f9fa4e038c5c21e31c9fc6629c91b1e62afd08cfc29acfd64356a93a835e8d03c89a8c5558