Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe
-
Size
213KB
-
MD5
88aa252e5759e70b52e8adf9f98934d2
-
SHA1
cea2057896dd24c99106d2e71b07ed9ffacf12a7
-
SHA256
2f33fea4d9fa351124cfdd91aca816f25a83050dee38ebff177e9d4b8fc8e1a6
-
SHA512
e6fb606c0082b3863cd9c4db8193863bcf0fddc5823ec9c7418736242df6bfa19d410c7f18e0dc1254339aab3bf4a539777bf1503b73749b66ce7fcffcf260f9
-
SSDEEP
6144:HN+TNmQ1J+tl7OwGWvv6I4RLgup5306QL1:tedQ64vqg606G1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\93536c53 = "C:\\Windows\\apppatch\\svchost.exe" 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe Token: SeSecurityPrivilege 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe Token: SeSecurityPrivilege 3048 svchost.exe Token: SeSecurityPrivilege 3048 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3048 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe 87 PID 1856 wrote to memory of 3048 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe 87 PID 1856 wrote to memory of 3048 1856 88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88aa252e5759e70b52e8adf9f98934d2_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
213KB
MD51b5e4e51f75af9d215694ac3223ac444
SHA12132824f54f31f3f10628188b2b027870eb69317
SHA256b9e9cfd21a611aa4d506aeb26bf7cde2d84b0460fb21a374923341f652a2e29f
SHA512e50f9054ee5b3ec25d55bc3decb81ed36c745b1dd06714f90f82abcb06e003727af44dc56b931a0d22ca46e19c3c23afebad91550068b79e5098f97c8143da2f