Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe
-
Size
266KB
-
MD5
89f1efe44aa74399d7b93354151f308e
-
SHA1
ba5aa7db202444db19e2021a2180faf17502c42a
-
SHA256
307ea1f3d838d032c5d5ba4fdbd8abe94fda8b95ee6a07576aedc1d31fa33f72
-
SHA512
c2758957758bdd0393a84b30c0b6f939eca6568003f4e3d4a59f080e44a759ddc9671cb969020324841423246aca5ac92715d1ccc9662b65c896cf33203ee1bf
-
SSDEEP
6144:V8g1k937vbCVl3py+5XB+9rgzUggHaxAOx:V8R9rvbCVW+5x+1gz6
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2272 muk.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 muk.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muk.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe Token: SeShutdownPrivilege 2704 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2272 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2272 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2272 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2272 2932 89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\muk.exe"C:\Users\Admin\AppData\Local\muk.exe" -gav C:\Users\Admin\AppData\Local\Temp\89f1efe44aa74399d7b93354151f308e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5dbf36e6def08b9a93143a07ce5f0d6b2
SHA1e0465314bf510f0b99555e675790c3eee29f12c9
SHA2566f0a07d47fe8dec45d364b000dd3020ea114879d5db5fdd3836d59ee8a042342
SHA512fdec2d634417f22b1d3e9e52da54493658041dab2ebe64d5de0c3a64cd49637e5a31215e1fff583718e81f8fa32297510f0888c37d316bb8cb4813fdd006ec54