Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe
-
Size
46KB
-
MD5
8e2603c1ffcdfbe90d0cf260e800b386
-
SHA1
4dcac39098777d9a8aaabf522d204b8115d6fb4d
-
SHA256
696b1db261a808fbcda34891bf0d51e95168957b672a12f2db4fe12f2a44b9bb
-
SHA512
691eb3ff20856c637c0dab8b2810ff7eec10cb7a3db419c66c16ce8832e0cdb455144c7de3117cbe06a5ffb0b3ca058968c883c50881f2bbaa23fedaed848ead
-
SSDEEP
768:Sf4v44KUh10tSQV4y+48R5J0YT7WGIYHsq0X5zxIPyJmHQ:Sf4v8w0wQVoR5WYTS7YyrEw
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Loads dropped DLL 1 IoCs
pid Process 1484 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\AltTjbvl.dIl 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8B3DAB2F-ABB1-4797-52AC-18C9CCACB205} 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B3DAB2F-ABB1-4797-52AC-18C9CCACB205}\ = "alttjbvl" 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B3DAB2F-ABB1-4797-52AC-18C9CCACB205}\InprocServer32 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B3DAB2F-ABB1-4797-52AC-18C9CCACB205}\InprocServer32\ = "C:\\Windows\\SysWow64\\AltTjbvl.dIl" 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B3DAB2F-ABB1-4797-52AC-18C9CCACB205}\InprocServer32\ThreadingModel = "Apartment" 8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe Token: SeShutdownPrivilege 2816 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e2603c1ffcdfbe90d0cf260e800b386_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1484
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c93f5d9f650b15876d272529f133071a
SHA1daa739a1e4f824e70bb8f45072f3b1d079291fa6
SHA256f2b6f14117d6a6c049200e41a9dce6dedb87a565a4e26151f1ee2e9b34429909
SHA512c21eb95c3df523c281017a3a4f27e2f6ad455c8a1176a69c81aebe4da397b39328695c5034e9069cdbd462c0d309c606f77226ff085cd58aa608c0f973f6168f