Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe
-
Size
492KB
-
MD5
b25f75f883e9e988810d14ef7dc24a94
-
SHA1
d97633dd0e7b5b3e49e5baea4d773717b6bfbf7c
-
SHA256
99edae9442b36feafb43f57b5bf57e0417a79ffcd0f1ee505172af33d4ddd004
-
SHA512
858505130217d9dad32e711322d38f6d59680c456d9ee0fc1590dea4dc51d3c295e4bb0d3e19e6b7583b34f3769dc39be008321ea34f7a15290bce5949701502
-
SSDEEP
12288:a/JKn80Lj1sSOU3CVWnL+dKnDEkY8OOl:GODdzO7vKnDE38
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C60BAB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C60BAB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000C60BAB4EB2331 = "C:\\ProgramData\\043A6A5B00014973000C60BAB4EB2331\\043A6A5B00014973000C60BAB4EB2331.exe" 043A6A5B00014973000C60BAB4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000C60BAB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 043A6A5B00014973000C60BAB4EB2331.exe 3000 043A6A5B00014973000C60BAB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3000 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 31 PID 2984 wrote to memory of 3000 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 31 PID 2984 wrote to memory of 3000 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 31 PID 2984 wrote to memory of 3000 2984 b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\ProgramData\043A6A5B00014973000C60BAB4EB2331\043A6A5B00014973000C60BAB4EB2331.exe"C:\ProgramData\043A6A5B00014973000C60BAB4EB2331\043A6A5B00014973000C60BAB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b25f75f883e9e988810d14ef7dc24a94_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD5b25f75f883e9e988810d14ef7dc24a94
SHA1d97633dd0e7b5b3e49e5baea4d773717b6bfbf7c
SHA25699edae9442b36feafb43f57b5bf57e0417a79ffcd0f1ee505172af33d4ddd004
SHA512858505130217d9dad32e711322d38f6d59680c456d9ee0fc1590dea4dc51d3c295e4bb0d3e19e6b7583b34f3769dc39be008321ea34f7a15290bce5949701502