Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
-
Size
204KB
-
MD5
8b951b798f8a988cf7ceba7cab8e5b80
-
SHA1
8e74a0cd88f4ecc99d7eb66e2e1bfc5bba3e13a8
-
SHA256
8d36ef1f332deebcc4ee12bb3e99709c3f137d01bf1701a04d7aa9f0fe5b1d58
-
SHA512
d50096e36d9787f314473ae5e397dec1e2edc153be2b42dc426c7d4b3536d32059d06240fd174e79aa0d1fbc0b050e731a529f8931dc9e0ae289ec4cc7569590
-
SSDEEP
6144:rveY2TNgrT9xrb4KgGiB7z/a9Qrtgq7Kfca:rkhAT9xn4KgGiB7bS8tzu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\13a4a1ec = "÷^ÙSÐSæ3$ÀÖ\x10ÜÄs¬°\u008fI™ÂU·\fzøØ\x1f\x1c,,'\x13)›%áï\tûôÄ\x15\x04ü„Óý’µ\x19ǧÜAY+]ãÛ´<c[yüýO—ìk+i\x11ÛÓ«$k!GÑ\x03c×Ëó$ÿ_ÍÕ´9,Ê\x1d\x14{?míDŲS\x15¢óLÄ%9›—›3´¡5C”Ã|\x17µü¹Û\x13Íâ}?ӽ˄tÌÊÔ³û\x1f1c¿³\x12\x14µù\x1f«3\x1b¹\x14”9¡Ô7ã\x1aú7Ëe÷_Ÿ£3©w—\x03µ_+\x05\x04»\vq‹D,”ùü\u009d\x7f\r½k£A‡¼|\nœÕ¬ôÔ§\x0fãD\x1fqÇñ\fKe9Û-ÄÌÉdJ²\x1aYTC}z\x15}‚oë\x13“ä\"O×ßá\\/ƒrscm+g\x14\a¹" 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Token: SeSecurityPrivilege 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Token: SeSecurityPrivilege 936 svchost.exe Token: SeSecurityPrivilege 936 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3312 wrote to memory of 936 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 86 PID 3312 wrote to memory of 936 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 86 PID 3312 wrote to memory of 936 3312 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
204KB
MD500bc172c8938dcf2687f4a6f07b1a372
SHA1105e0b0ae0c88be1cdc5ceb5b8c537831069bca4
SHA256e45c5e332eb0d8117382f56c71fb1ef7a80f183dbb39e32542a57578c41345db
SHA512b004db3ae05303d5ebc361d746d74ee9bd4d7b7daf8a4cc65e6d3af8efe50a76edf93c9ccd99c463b528baf09325609f2070989349421ea11478ea6948d61d69