Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe
-
Size
257KB
-
MD5
86ff4f2c9e4fd30afcd4a444c8060d39
-
SHA1
4604e5b9bae019eaffcf8311bf93e981e2eae64f
-
SHA256
5c59dc50087c862e91047556ea7bfe10ff4988c06a718f50493ec094bb22b90f
-
SHA512
ff07b8ca71f87ea1c8e44f6770d2782a27131b6be62109909dc0a8fe419c850f9827b74405fe1f4e3b525890a07e1808cac39c6af4a67a2a002a2a6276600638
-
SSDEEP
3072:wS5jxPLn8bywhaYiwEScQWsEetmvevzzDvOO782xOPVuatnlWb8LirHQAj1U41Gp:ht4i62sE2ZzW9fPV7TWaDAj13IzhUS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\86FF4F~1.EXE," 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\86FF4F~1.EXE" 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\cbfe5809 = "H>Bó-î3Íw祌T\x17\u0081è;›·D‡ÿÅ\x0f<0úŸb/”›k2Ù¿\u008dçÕϱgOS·xí`1\"÷\x1d’¨W\x12—\x1aÝŽ»#^—7Ìó$Rš\u00adTòx\"þÇ_âUmÌIà^ë\x1eÆÓ\x16‹V\x1b©IÑ,Fƒ–ë“ÝÓæÌÖ\x04Ž%4ŒCC\\3KŽé\x066{Nã±3\u008d«Ö…Þ$aF;žÔá|ÝDM{^nξ6~\x03\x01î5U¥\x0e3K¬üI©n\x03ƒ›F\x11›Ù–~N‘óé[ná\x0e–&ΩkÞ\u00ad\x1e†Înã[5þÃ\x0e\x03y\fCÆë¾µæÔ‹.¦«\x03©ÑQ&\x1b\x16¤ÃdãtLó=\x1eöQnž\\\vÖ[\v~~\x1b\u0081”\x0eN\x01†Õ›¬\x0eûžK\x03E3\x1e\x1cCŽn" 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\86FF4F~1.EXE" 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe Token: SeSecurityPrivilege 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe Token: SeSecurityPrivilege 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe Token: SeSecurityPrivilege 2312 86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86ff4f2c9e4fd30afcd4a444c8060d39_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312