Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe
-
Size
674KB
-
MD5
76052d4b85ec76db757eb6b4d7587fba
-
SHA1
a7cbdc3ec66ae4f285d754df0b88f23c28b8cf4b
-
SHA256
4028c58dc2e2004bbed97de7bad99898cc5971cd7e56ec0c320fa2e2703b7ecc
-
SHA512
9d61665165fa1b4163c54ee2196895b32466fe6db1e23586535ad36acb9fb64fa9dd7dd153a02a1b44277d593eec9e96ddbfe25c1084601c4cb8470d4de9f732
-
SSDEEP
12288:COwT6AVg9jzrpMPSK3+laYSnjj2FsgYSqKZdb/MJtptHmGgRC5IGxtIXc3AQ:6T6eaK3y9Sn32lYSJAVtGGgRCKgtIXcD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\PROGRA~1\\COMMON~1\\Microsoft\\CTHELPER.EXE" CTHELPER.EXE -
Executes dropped EXE 1 IoCs
pid Process 2944 CTHELPER.EXE -
Loads dropped DLL 2 IoCs
pid Process 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 2944 CTHELPER.EXE -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft\Storeymyadmin.exe 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\Storeymyadmin.exe 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\res\tc2.tmp CTHELPER.EXE File created C:\Program Files\Common Files\mi.g CTHELPER.EXE File opened for modification C:\Program Files\Common Files\onceagain.sc CTHELPER.EXE File created C:\Program Files\Common Files\krnln.fnr 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\res\tc4.tmp CTHELPER.EXE File created C:\Program Files\Common Files\onceagain.sc CTHELPER.EXE File created C:\Program Files\Common Files\Microsoft\krnln.fnr 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft\krnln.fnr 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft\com.run 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\com.run 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe File created C:\Program Files\Common Files\res\tc1.tmp CTHELPER.EXE File created C:\Program Files\Common Files\res\tc3.tmp CTHELPER.EXE File opened for modification C:\Program Files\Common Files\Microsoft\cVer.ini CTHELPER.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CTHELPER.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE 2944 CTHELPER.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2944 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 87 PID 3476 wrote to memory of 2944 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 87 PID 3476 wrote to memory of 2944 3476 76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76052d4b85ec76db757eb6b4d7587fba_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files\Common Files\CTHELPER.EXE"C:\Program Files\Common Files\CTHELPER.EXE"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD5f55c61e01653533fdbf7d97e6bd8a3ff
SHA13c433305b1d12f7db4ab5d776c4e49c3da059926
SHA2567b7e9995eff54560ed2f41896fab4326693c4fac63c626646a0cb4db69d29bc9
SHA512ccc1480d663829d0c00fb41beb6057bf5a2995f6491c5ae62dd45de647cb4ff7f40c0e5285b56af576a469f964b275c5609928797b1cbb92969d1521b80e1026
-
Filesize
68B
MD5f272a14f7c0a7a1be084bfd471253957
SHA1c3349b83bee9a3761d204620ff1415b7d1f06bdf
SHA256385f74a077bc08b53ec1f18e093b7549b1a47461d5e88d47d667b5dd8f01ead1
SHA51291ec24b44637c648e7a91acbf8ef558fe50108129a4c161bf96409c795847d36254b6d054eabe95f20c1aefa949810ac8af298db058d66f6a855176eb9968ba5
-
Filesize
68B
MD53933e5ecf9cbb85472b64019cade74e6
SHA137abe7c458037d5843a536cbd0da42e00f26c11b
SHA256397c7f4065d74bd56195c91a0d1abe73921467adcef02e99c35ffb256262c2fe
SHA5122d870c6c7b5501108c765b8f07abc0cacf4eba485410f744d1df3bf1e58f5116e123331bacc720b34613798eb4b75623ecd7efaf1798089309ec9f87a58e700e
-
Filesize
68B
MD533af46d6c886b6b72f9cd77812a0349d
SHA17b213ac72c05bc7898a92abed0c912bf7ba87e01
SHA2569718ec13ca72b5733843b10dd7164e6d5fcd10e27ac71f30834a48e67d31d857
SHA51294e9a0e47ff80ef261e8edecd39a7d5c2ca0706f8ca2fd3a142028f1a72747191d5808afac580c2fea0db28b66484cb299186a7701218207b78293cb7032e1be
-
Filesize
58B
MD5cdceeceee6fed31fe739fa9f3e995fe0
SHA1c18060df86d2f0b6129dba8ed965dc8c7fb2aa55
SHA2569b16f939608d7d8ec3d7c78a28b91d59bd4401a5f86f9899ebce6c7d9bad8f1a
SHA5124d46cb1eceb00dd4fca14dff0b08ed0b2fefca1024593ad06df07e239638788040032f8d7de80e2a1764d7199ac3ed80cb810cdf1bcf3f93b864b554768c4c30
-
Filesize
378KB
MD5aaf112c6e858ed3fd8d2132cc60bf8c8
SHA1c0b9c27c14de77ac78f6dbc8cba1ae403d82cf7c
SHA25642f6867590e93aee0c7723802b771981c2b01f95e611e2e4691eb1af2353863f
SHA512cc8ec3f9e2f06df2b66477f5a4b70fc8e6d6977ca997091d6dc853dcf8e13d4f2a14668e12c1907541660f43ac93c7e3f10b3a17c09ab909fa18d42ef762a245