Analysis
-
max time kernel
22s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe
-
Size
830KB
-
MD5
b35e2600d6f1b1bc8a658e32e4c8a5af
-
SHA1
b08985c46fe68ee1b606675e202ace7313157a26
-
SHA256
0ecfd6719166c4fd8e6eb23e41916b9c4f6980ad569a949496c96e5071a983a7
-
SHA512
67abc6d3faecab9878bdfcfb335d46090c51033a2d65aeb5f9b13c0a059c0b1a2445f1487f0f51f0c2c68638b712ba41fd3152cb8ce3bb843b9fcd540234a8cf
-
SSDEEP
12288:hAfRJ/lS0crSUCUagoZegeyKb1rwgDDheH9D2raw8mXhh5mM3K8AVapT:C/lSYFUGuhehwpXZ+8d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\JavaRE\\bin\\Java.exe" b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2468 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2128 Java.exe 2696 Java.exe -
Loads dropped DLL 3 IoCs
pid Process 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 2128 Java.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\JavaRE\\bin\\Java.exe" b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2980 set thread context of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2128 set thread context of 2696 2128 Java.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Java.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Java.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2468 cmd.exe 2832 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2832 PING.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeSecurityPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeSystemtimePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeBackupPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeRestorePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeShutdownPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeDebugPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeUndockPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeManageVolumePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeImpersonatePrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: 33 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: 34 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: 35 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2696 Java.exe Token: SeSecurityPrivilege 2696 Java.exe Token: SeTakeOwnershipPrivilege 2696 Java.exe Token: SeLoadDriverPrivilege 2696 Java.exe Token: SeSystemProfilePrivilege 2696 Java.exe Token: SeSystemtimePrivilege 2696 Java.exe Token: SeProfSingleProcessPrivilege 2696 Java.exe Token: SeIncBasePriorityPrivilege 2696 Java.exe Token: SeCreatePagefilePrivilege 2696 Java.exe Token: SeBackupPrivilege 2696 Java.exe Token: SeRestorePrivilege 2696 Java.exe Token: SeShutdownPrivilege 2696 Java.exe Token: SeDebugPrivilege 2696 Java.exe Token: SeSystemEnvironmentPrivilege 2696 Java.exe Token: SeChangeNotifyPrivilege 2696 Java.exe Token: SeRemoteShutdownPrivilege 2696 Java.exe Token: SeUndockPrivilege 2696 Java.exe Token: SeManageVolumePrivilege 2696 Java.exe Token: SeImpersonatePrivilege 2696 Java.exe Token: SeCreateGlobalPrivilege 2696 Java.exe Token: 33 2696 Java.exe Token: 34 2696 Java.exe Token: 35 2696 Java.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 2128 Java.exe 2696 Java.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2960 2980 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 31 PID 2960 wrote to memory of 2128 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2128 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2128 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2128 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 32 PID 2960 wrote to memory of 2468 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 33 PID 2960 wrote to memory of 2468 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 33 PID 2960 wrote to memory of 2468 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 33 PID 2960 wrote to memory of 2468 2960 b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe 33 PID 2468 wrote to memory of 2832 2468 cmd.exe 35 PID 2468 wrote to memory of 2832 2468 cmd.exe 35 PID 2468 wrote to memory of 2832 2468 cmd.exe 35 PID 2468 wrote to memory of 2832 2468 cmd.exe 35 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36 PID 2128 wrote to memory of 2696 2128 Java.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\JavaRE\bin\Java.exe"C:\JavaRE\bin\Java.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\JavaRE\bin\Java.exe"C:\JavaRE\bin\Java.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\b35e2600d6f1b1bc8a658e32e4c8a5af_JaffaCakes118.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD5b35e2600d6f1b1bc8a658e32e4c8a5af
SHA1b08985c46fe68ee1b606675e202ace7313157a26
SHA2560ecfd6719166c4fd8e6eb23e41916b9c4f6980ad569a949496c96e5071a983a7
SHA51267abc6d3faecab9878bdfcfb335d46090c51033a2d65aeb5f9b13c0a059c0b1a2445f1487f0f51f0c2c68638b712ba41fd3152cb8ce3bb843b9fcd540234a8cf