Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe
-
Size
318KB
-
MD5
6c50c8abafb090571b809b7e440760fb
-
SHA1
940400974cbe308babd859914b0f8158168a7d67
-
SHA256
987a459213fe3739f0b3a9599a965c98fd7ffe48217cb7051649767b5815a87d
-
SHA512
2e965287ef25056c6d9edd113ea87d72a674d90b01f9db97bf9092bb820bbd35cd8b125ba0593d73561f23f7916d3223322652a221258935d010ccd51f0f6878
-
SSDEEP
6144:TKjZy6NQ1xaIN8kUedSzx2ME5+b/LNWZR6c2r4/OQfUg8UW:yNQ/2kb35+nsoc2MRF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation nvxdsinc.exe -
Deletes itself 1 IoCs
pid Process 4564 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe -
resource yara_rule behavioral2/memory/3912-20-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-21-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-22-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-24-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-23-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-27-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-26-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/3912-25-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4564 set thread context of 3912 4564 explorer.exe 91 PID 1644 set thread context of 1412 1644 nwtray.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvxdsinc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwtray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe 468 nvxdsinc.exe 1644 nwtray.exe 4564 explorer.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 2888 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe Token: SeDebugPrivilege 4564 explorer.exe Token: SeIncreaseQuotaPrivilege 3912 AppLaunch.exe Token: SeSecurityPrivilege 3912 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3912 AppLaunch.exe Token: SeLoadDriverPrivilege 3912 AppLaunch.exe Token: SeSystemProfilePrivilege 3912 AppLaunch.exe Token: SeSystemtimePrivilege 3912 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3912 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3912 AppLaunch.exe Token: SeCreatePagefilePrivilege 3912 AppLaunch.exe Token: SeBackupPrivilege 3912 AppLaunch.exe Token: SeRestorePrivilege 3912 AppLaunch.exe Token: SeShutdownPrivilege 3912 AppLaunch.exe Token: SeDebugPrivilege 3912 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3912 AppLaunch.exe Token: SeChangeNotifyPrivilege 3912 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3912 AppLaunch.exe Token: SeUndockPrivilege 3912 AppLaunch.exe Token: SeManageVolumePrivilege 3912 AppLaunch.exe Token: SeImpersonatePrivilege 3912 AppLaunch.exe Token: SeCreateGlobalPrivilege 3912 AppLaunch.exe Token: 33 3912 AppLaunch.exe Token: 34 3912 AppLaunch.exe Token: 35 3912 AppLaunch.exe Token: 36 3912 AppLaunch.exe Token: SeDebugPrivilege 468 nvxdsinc.exe Token: SeDebugPrivilege 1644 nwtray.exe Token: SeIncreaseQuotaPrivilege 1412 AppLaunch.exe Token: SeSecurityPrivilege 1412 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1412 AppLaunch.exe Token: SeLoadDriverPrivilege 1412 AppLaunch.exe Token: SeSystemProfilePrivilege 1412 AppLaunch.exe Token: SeSystemtimePrivilege 1412 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1412 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1412 AppLaunch.exe Token: SeCreatePagefilePrivilege 1412 AppLaunch.exe Token: SeBackupPrivilege 1412 AppLaunch.exe Token: SeRestorePrivilege 1412 AppLaunch.exe Token: SeShutdownPrivilege 1412 AppLaunch.exe Token: SeDebugPrivilege 1412 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1412 AppLaunch.exe Token: SeChangeNotifyPrivilege 1412 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1412 AppLaunch.exe Token: SeUndockPrivilege 1412 AppLaunch.exe Token: SeManageVolumePrivilege 1412 AppLaunch.exe Token: SeImpersonatePrivilege 1412 AppLaunch.exe Token: SeCreateGlobalPrivilege 1412 AppLaunch.exe Token: 33 1412 AppLaunch.exe Token: 34 1412 AppLaunch.exe Token: 35 1412 AppLaunch.exe Token: 36 1412 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3912 AppLaunch.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2888 wrote to memory of 4564 2888 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe 89 PID 2888 wrote to memory of 4564 2888 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe 89 PID 2888 wrote to memory of 4564 2888 6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe 89 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 3912 4564 explorer.exe 91 PID 4564 wrote to memory of 468 4564 explorer.exe 92 PID 4564 wrote to memory of 468 4564 explorer.exe 92 PID 4564 wrote to memory of 468 4564 explorer.exe 92 PID 468 wrote to memory of 1644 468 nvxdsinc.exe 93 PID 468 wrote to memory of 1644 468 nvxdsinc.exe 93 PID 468 wrote to memory of 1644 468 nvxdsinc.exe 93 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94 PID 1644 wrote to memory of 1412 1644 nwtray.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6c50c8abafb090571b809b7e440760fb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD53d934c7e6bf9d95f040a27812ed80dda
SHA19446dbb215bb3f04859de1f3cd7ae47b58651422
SHA25660b26a8e979506eacfa07fb0c5c8e1646814f0aac14b9a69c86235344a066b99
SHA51248f9a9ce09c26e8659ee3b320f71bd945c65fc9da1916e53b12613979bca20c216c554ff5b60e58bb90d36d8f14d582a1c1bbe2fd63f5296054fdc66e0ebcd35
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274
-
Filesize
318KB
MD56c50c8abafb090571b809b7e440760fb
SHA1940400974cbe308babd859914b0f8158168a7d67
SHA256987a459213fe3739f0b3a9599a965c98fd7ffe48217cb7051649767b5815a87d
SHA5122e965287ef25056c6d9edd113ea87d72a674d90b01f9db97bf9092bb820bbd35cd8b125ba0593d73561f23f7916d3223322652a221258935d010ccd51f0f6878