Analysis
-
max time kernel
146s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe
-
Size
392KB
-
MD5
ac1b1649e4f003e751f3a18c450d39e6
-
SHA1
4c32b32bc9cb91caf74368f029aa2b668652cd9b
-
SHA256
d9b626e5931b3933def234c814098786c1a48197c82de432cba5eedbc65c6e95
-
SHA512
d0a90f8f74e08b67fe760f89d29d3efecaef40f29e3208d78e4e0613dd2cb976b93a99aeb22b9f4565fe040ec9c64d86d42e857f06ba075c3113444332e260fe
-
SSDEEP
6144:AA2mGp9VUwTZtX02giP9YoRRQGb8gJCPankzjzVjyTVyS9m1D4EGQO:AVjmwTZSihRQwJCi4zVWThBEGj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AEC12B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AEC12B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000AEC12B4EB2331 = "C:\\ProgramData\\043A6A5B00014973000AEC12B4EB2331\\043A6A5B00014973000AEC12B4EB2331.exe" 043A6A5B00014973000AEC12B4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000AEC12B4EB2331.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1568 043A6A5B00014973000AEC12B4EB2331.exe 1568 043A6A5B00014973000AEC12B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1568 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1568 3024 ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331.exe"C:\ProgramData\043A6A5B00014973000AEC12B4EB2331\043A6A5B00014973000AEC12B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\ac1b1649e4f003e751f3a18c450d39e6_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5ac1b1649e4f003e751f3a18c450d39e6
SHA14c32b32bc9cb91caf74368f029aa2b668652cd9b
SHA256d9b626e5931b3933def234c814098786c1a48197c82de432cba5eedbc65c6e95
SHA512d0a90f8f74e08b67fe760f89d29d3efecaef40f29e3208d78e4e0613dd2cb976b93a99aeb22b9f4565fe040ec9c64d86d42e857f06ba075c3113444332e260fe