Analysis
-
max time kernel
128s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe
-
Size
107KB
-
MD5
952afc9d66f11eeedc549cc7d24954cb
-
SHA1
308f70481ceb17c0d3d77867eea0ab7da1da6498
-
SHA256
908f3e56bf7c9bf7b3aa5a486d24921e4eadea3d8eabead36e7abc3af6e62b26
-
SHA512
2a52a83898d537f607ffb69350ebe959419b44368be9d523400261c17500d7ccca4471180a63543617c0e7e7ce9844e81276c0c148b4a873396ed466f072580d
-
SSDEEP
1536:TpqFQnVOw66Txr2Lx0cMO7ZQejq0QnqUyDDkgJYIkgX4/i+VwFuSsF:0QV71A0/O7y6KqXPk6Y9E49w8SsF
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\olinkinfo.dll 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe File opened for modification C:\Windows\olinkinfo.dll 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe File created C:\WINDOWS\LINKINFO.DLL 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe File created C:\WINDOWS\SFDLL.DLL 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe Token: SeShutdownPrivilege 2820 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe 2820 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2820 2728 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2820 2728 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2820 2728 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2820 2728 952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\952afc9d66f11eeedc549cc7d24954cb_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2820
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD51387ce50932aa43e069f3dd078152853
SHA12842272cff673d0bbaedb7eaac64eec798b7a5d6
SHA25649b5ebdb5244ed62c0ea91822e8faedab799edd85e00aa5119354a6946f208cb
SHA51213985d501e75ed2b718c7f9ed3ecee239628495d1e8017c147c4447cb489da290526eca709acb8236a4991854ab41ecd62970077fc1f84926dbee3ae4995b698