Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe
-
Size
333KB
-
MD5
65e39380be54af7407ba8012931a92f9
-
SHA1
3b7b8dd04c0915f86756907b853cff71c5879c4a
-
SHA256
3e0a3cd4c6089ed14cd08e64ad8b4fca42408dab2687663005d98b5e47d02509
-
SHA512
56028362b6a78ad15191d9b174ea04de8d40a2c9e500bd835366651b891e30cf6af1b65bc74ae69e55506ab70ed35dcaf16c51082da93360a8d48e40e1f0293d
-
SSDEEP
6144:ouCPuoDYt8NpRqPBO3To0G9S4iXEXiuTkhw:YSOIU345SuTkw
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2556 ggw.exe -
Executes dropped EXE 1 IoCs
pid Process 2556 ggw.exe -
Loads dropped DLL 2 IoCs
pid Process 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 2556 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 29 PID 656 wrote to memory of 2556 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 29 PID 656 wrote to memory of 2556 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 29 PID 656 wrote to memory of 2556 656 65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\ggw.exe"C:\Users\Admin\AppData\Local\ggw.exe" -gav C:\Users\Admin\AppData\Local\Temp\65e39380be54af7407ba8012931a92f9_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2556
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD565e39380be54af7407ba8012931a92f9
SHA13b7b8dd04c0915f86756907b853cff71c5879c4a
SHA2563e0a3cd4c6089ed14cd08e64ad8b4fca42408dab2687663005d98b5e47d02509
SHA51256028362b6a78ad15191d9b174ea04de8d40a2c9e500bd835366651b891e30cf6af1b65bc74ae69e55506ab70ed35dcaf16c51082da93360a8d48e40e1f0293d