Analysis
-
max time kernel
146s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe
-
Size
283KB
-
MD5
a9ee88068ad0b2b0d37a463e059a244e
-
SHA1
d280ef1a92b19d733bff45f83b54d7d42486504f
-
SHA256
0e59eab23e2c904a9fa561c6b421d7a3c3e0d08d60c0de0efe1bdf7a976121ec
-
SHA512
8ee5bc33d0b63844facb91f5903e6d00ac31db3bee48d7167bfd3f0a412ae3ae27bf07f0ae451147fcaa6b7ee205a3e1a44d09c25ad147fe17541c83fa21e217
-
SSDEEP
6144:XqNuy2Y5tGbOPpJrHY7NiTzdOrImdUMBUa97lLUCOJ:9PatnJTyit2ImdUu95U
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2668 qwf.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 qwf.exe -
Loads dropped DLL 2 IoCs
pid Process 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwf.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 2528 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2668 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2668 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2668 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2668 3036 a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\qwf.exe"C:\Users\Admin\AppData\Local\qwf.exe" -gav C:\Users\Admin\AppData\Local\Temp\a9ee88068ad0b2b0d37a463e059a244e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5a9ee88068ad0b2b0d37a463e059a244e
SHA1d280ef1a92b19d733bff45f83b54d7d42486504f
SHA2560e59eab23e2c904a9fa561c6b421d7a3c3e0d08d60c0de0efe1bdf7a976121ec
SHA5128ee5bc33d0b63844facb91f5903e6d00ac31db3bee48d7167bfd3f0a412ae3ae27bf07f0ae451147fcaa6b7ee205a3e1a44d09c25ad147fe17541c83fa21e217