Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe
-
Size
320KB
-
MD5
822a7359aada30db7c00c0cd1e4e2518
-
SHA1
5b5188504a10023b163862b10f307ae22201f115
-
SHA256
d88b7e4f98dcde97d4aca7f3db5475270319e522c7d6f46e7df11cdd84b8fd10
-
SHA512
9ff0a66ba46174bccdf2c8b3d324288bc8a682ed09b667d27a3f3f18799041f03c744fd446cc51134e5672ce893da2b55fece607d47900481fddd1efc8b4ac67
-
SSDEEP
6144:wf9spTEkIl6pzL/erEDj23rd1lds6jybRS4y/EVLn88BJ0Wi0OBU:CSpO6N/erk23rvjybRfXVLn1n0Wi
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2068 mvg.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 mvg.exe -
Loads dropped DLL 2 IoCs
pid Process 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvg.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe Token: SeShutdownPrivilege 2660 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2068 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2068 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2068 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2068 2984 822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\mvg.exe"C:\Users\Admin\AppData\Local\mvg.exe" -gav C:\Users\Admin\AppData\Local\Temp\822a7359aada30db7c00c0cd1e4e2518_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5d326a2d113cf407b15612b8dfdba8b26
SHA1a789d74818074b26774e1cbcd9a0d5cc7cf1f315
SHA256c9f44898cf2eefd0f8ccd62083eb4ffc2ffd76d0ca7c70fa2125d07b4f352cae
SHA512de4f351b0f351b63d1af585602d7bed747ea90097872691b9cf2fc932f3b1e01063f53f4b90d095967dbc6035f9a19d4cedea53d3bcd589bca67498efd2926ab
-
Filesize
2B
MD5e0e8bfafbb0689563b2fba789c97b3cc
SHA1da33e41954997c24ad31f6c1845e18510b384f67
SHA256ea5dbf9596d187e9500f23e9a680109475341cf4e81f7e043f7d97152c10772f
SHA512823ff44c829aa3b7ca7926fb0f864f86b2a8e4ea4b4b3f2da6e25e7df5985a1eaa6bbb40460de1e6703b9405f7c0a0f3ceb20ede771d4241d55bd4b6f459f464
-
Filesize
320KB
MD5822a7359aada30db7c00c0cd1e4e2518
SHA15b5188504a10023b163862b10f307ae22201f115
SHA256d88b7e4f98dcde97d4aca7f3db5475270319e522c7d6f46e7df11cdd84b8fd10
SHA5129ff0a66ba46174bccdf2c8b3d324288bc8a682ed09b667d27a3f3f18799041f03c744fd446cc51134e5672ce893da2b55fece607d47900481fddd1efc8b4ac67