Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 11:57
Behavioral task
behavioral1
Sample
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe
-
Size
452KB
-
MD5
677f7c42f79a0a58760056529739fdd6
-
SHA1
c05b90eb5caf8c2dca610b6f7253fe58b5c4a6a3
-
SHA256
07c7d7e3f4da80983f09256241d8cc0b3f986f31ef65af2fa87b03c11cdebb65
-
SHA512
0e8e3b4042af7eddbc51a0f1552c504a08880f554c406b81f55fc9a8c0c4ac23ecd295c92d0741c66ed60749ca39999c9cbead1bcc7c94cf6e141f2188587389
-
SSDEEP
6144:CbtQmb25Zh18hqJbDqSB7Lvq2XsjYiVmOf7Yp4jOa9UpE:CmmCVRtPvq2+d/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
temp.exepid process 4844 temp.exe -
Drops file in System32 directory 4 IoCs
Processes:
sysprep.exedescription ioc process File opened for modification C:\Windows\system32\sysprep\Panther\setuperr.log sysprep.exe File opened for modification C:\Windows\system32\sysprep\Panther\diagerr.xml sysprep.exe File opened for modification C:\Windows\system32\sysprep\Panther\diagwrn.xml sysprep.exe File opened for modification C:\Windows\system32\sysprep\Panther\setupact.log sysprep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
temp.exepid process 4844 temp.exe 4844 temp.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3492 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exetemp.exeExplorer.EXEdescription pid process target process PID 2508 wrote to memory of 4844 2508 677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe temp.exe PID 2508 wrote to memory of 4844 2508 677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe temp.exe PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 4844 wrote to memory of 3492 4844 temp.exe Explorer.EXE PID 3492 wrote to memory of 4816 3492 Explorer.EXE sysprep.exe PID 3492 wrote to memory of 4816 3492 Explorer.EXE sysprep.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677f7c42f79a0a58760056529739fdd6_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\sysprep\sysprep.exe"C:\Windows\system32\sysprep\sysprep.exe" "C:\Users\Admin\AppData\Local\Temp\net.exe" "C:\Windows\system32" ""2⤵
- Drops file in System32 directory
PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5425609a2c35081730982a01d72a76cbe
SHA164f95fe985a7ef7ee4f396e36279aa31498ac3cc
SHA256e03145fefe7fef82c2a476d7dec03305d7da79cd3c8fe1578177580175febbd3
SHA5126ede1415ac51d588a71bfb5697a599eb777e9530240b7a3524626d2a230bb51017c9b3d05923c5cb41800cca9818f2d99484310390a0425ef8e48984c4c9cfd4