Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 18:15
Behavioral task
behavioral1
Sample
9f6c366d66024056984513734f4709ad_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9f6c366d66024056984513734f4709ad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9f6c366d66024056984513734f4709ad_JaffaCakes118.exe
-
Size
115KB
-
MD5
9f6c366d66024056984513734f4709ad
-
SHA1
ca8b49c7ba4e1d99f447ed5980d227fb542d69ac
-
SHA256
b9c0040d24e53c074412e63792bfeb50ebbfd008dbac28cfa24775ea3a28d495
-
SHA512
e9ffc2bbd8f6be68dd43854cbf63a424a83be59f1605cabfee17043a5f0384969a9561d88b0d5c3da0404e2172559ac1c757a72f112018da0a43cf5ef67b52e1
-
SSDEEP
3072:bkdNMBfk2LgpN2JtbOxRFvwncL0Qed+M2uadvM4:Eak0CZvigM2uadvM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
Wow6432Node.exe9f6c366d66024056984513734f4709ad_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" Wow6432Node.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 15 IoCs
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exeWow6432Node.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ Wow6432Node.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe:*:Enabled:Wow6432Node" Wow6432Node.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe:*:Enabled:Wow6432Node" Wow6432Node.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe:*:Enabled:Wow6432Node" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe:*:Enabled:Wow6432Node" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Wow6432Node.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\ Wow6432Node.exe -
Adds policy Run key to start application 2 TTPs 8 IoCs
Processes:
Wow6432Node.exe9f6c366d66024056984513734f4709ad_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Wow6432Node.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" Wow6432Node.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Wow6432Node.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" Wow6432Node.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral2/memory/336-0-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/336-6-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/960-17-0x0000000000400000-0x0000000000448000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exeWow6432Node.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" Wow6432Node.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wow6432Node = "C:\\Users\\Admin\\AppData\\Roaming\\Wow6432Node\\Wow6432Node.exe" Wow6432Node.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exeWow6432Node.exedescription pid Process procid_target PID 336 set thread context of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 960 set thread context of 4048 960 Wow6432Node.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exe9f6c366d66024056984513734f4709ad_JaffaCakes118.exeWow6432Node.exeWow6432Node.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wow6432Node.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wow6432Node.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exepid Process 1204 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
9f6c366d66024056984513734f4709ad_JaffaCakes118.exe9f6c366d66024056984513734f4709ad_JaffaCakes118.exeWow6432Node.exedescription pid Process procid_target PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 336 wrote to memory of 1204 336 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 91 PID 1204 wrote to memory of 960 1204 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 93 PID 1204 wrote to memory of 960 1204 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 93 PID 1204 wrote to memory of 960 1204 9f6c366d66024056984513734f4709ad_JaffaCakes118.exe 93 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96 PID 960 wrote to memory of 4048 960 Wow6432Node.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f6c366d66024056984513734f4709ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f6c366d66024056984513734f4709ad_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\9f6c366d66024056984513734f4709ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f6c366d66024056984513734f4709ad_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\Wow6432Node\Wow6432Node.exe"C:\Users\Admin\AppData\Roaming\Wow6432Node\Wow6432Node.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Wow6432Node\Wow6432Node.exe"C:\Users\Admin\AppData\Roaming\Wow6432Node\Wow6432Node.exe"4⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4