Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:42
Behavioral task
behavioral1
Sample
7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe
-
Size
228KB
-
MD5
7716f695228f451da6048afedbf0ec5c
-
SHA1
112acae8be69453ddcf05a69e7e7595227117583
-
SHA256
1234f20e85e6fe42ec9baf95cfd1745964cd0273d071642f10b3b9952d2cca73
-
SHA512
534fd00991935b3d386a1b53aabebfd9829baffa6d20c2fda788cb3d82fef83213b53d663437cd52df8ec5edf9c2d6edcff265b4f71ddae3e37a5a6a63817330
-
SSDEEP
6144:VWwZltVp6fQ5R8GdwPikVuQxx9CjmmlLWi1rp:VWidpm50ipVNxDCdlbF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe,C:\\WINDOWS\\System32\\userinit.exe," 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe,C:\\WINDOWS\\System32\\userinit.exe," 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61r1K7Zg-HMWm-14l4-knLL-DFbthPjzcAFc} 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61r1K7Zg-HMWm-14l4-knLL-DFbthPjzcAFc}\BX6kRBeYBXtpN21 = "\"C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe\" /ActiveX" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/912-0-0x0000000000400000-0x0000000000451600-memory.dmp upx behavioral2/memory/1424-3-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1424-4-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1424-6-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1424-7-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/912-8-0x0000000000400000-0x0000000000451600-memory.dmp upx behavioral2/memory/1424-10-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1424-9-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1424-23-0x0000000000400000-0x000000000047A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BX6kRBeYBXtpN21 = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BX6kRBeYBXtpN21 = "C:\\Users\\Admin\\AppData\\Roaming\\y6drxuj c7ti.exe" 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 912 set thread context of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 1424 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85 PID 912 wrote to memory of 1424 912 7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7716f695228f451da6048afedbf0ec5c_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2