Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe
-
Size
158KB
-
MD5
b3ef9301868afaace31e7d6a103a9e1f
-
SHA1
830b052096194d46853cc7b1dca534987a2efce8
-
SHA256
2de60f0a9603aa9e2e8512772444bb04f249c36b9d9bee825a2ad07d7ce729de
-
SHA512
ebbb55a25ad428a3387d1018259967ccac126e09ea5a2f69f5a47f18f6690a9f72b874045601a04ff698656ca8c2c70ab0c63348ab427e65fd5d939befd4087f
-
SSDEEP
3072:Q7vyirQsl71vUKNG49MWY/LGkSXqwTSGDCScgRy5+QvLfcJPEt:Q7vT/tUKLvYBmS2ZRy5t
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3024 newdnswatch.exe 3456 WnT9C21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5Z3U4G4I5X6G3F7JXBZOJQSGFEOCE = "C:\\newdnswatch\\newdnswatch.exe /q" WnT9C21.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newdnswatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WnT9C21.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\PhishingFilter WnT9C21.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" WnT9C21.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" WnT9C21.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Recovery WnT9C21.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" WnT9C21.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 3024 newdnswatch.exe 3024 newdnswatch.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe 3456 WnT9C21.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe Token: SeDebugPrivilege 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe Token: SeDebugPrivilege 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe Token: SeDebugPrivilege 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe Token: SeDebugPrivilege 3024 newdnswatch.exe Token: SeDebugPrivilege 3024 newdnswatch.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe Token: SeDebugPrivilege 3456 WnT9C21.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3484 wrote to memory of 3024 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 87 PID 3484 wrote to memory of 3024 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 87 PID 3484 wrote to memory of 3024 3484 b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe 87 PID 3024 wrote to memory of 3456 3024 newdnswatch.exe 88 PID 3024 wrote to memory of 3456 3024 newdnswatch.exe 88 PID 3024 wrote to memory of 3456 3024 newdnswatch.exe 88 PID 3024 wrote to memory of 3456 3024 newdnswatch.exe 88 PID 3024 wrote to memory of 3456 3024 newdnswatch.exe 88 PID 3456 wrote to memory of 3484 3456 WnT9C21.exe 83 PID 3456 wrote to memory of 3484 3456 WnT9C21.exe 83 PID 3456 wrote to memory of 3484 3456 WnT9C21.exe 83 PID 3456 wrote to memory of 3484 3456 WnT9C21.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3ef9301868afaace31e7d6a103a9e1f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\newdnswatch\newdnswatch.exe"C:\newdnswatch\newdnswatch.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\WnT9C21.exe"C:\Users\Admin\AppData\Local\Temp\WnT9C21.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
5KB
MD5b6297e20310c35aa1517c13667009ea1
SHA1d34db88e3c6d3c39ef8997cd4fa6d67d00f7ef3b
SHA2567e9c2da1ad343673c03b6f5cdb8547ae50580188d63503233bf8dec628d4b5ed
SHA512d4a5709fc61d97bf30ec0193aaeb9b30b67634b0257b90cdd064180c6b349cde92adc4e06209b6d04ff54e5c0c3103420760424c9ed7f6bef64eca16268b1d2a
-
Filesize
158KB
MD5b3ef9301868afaace31e7d6a103a9e1f
SHA1830b052096194d46853cc7b1dca534987a2efce8
SHA2562de60f0a9603aa9e2e8512772444bb04f249c36b9d9bee825a2ad07d7ce729de
SHA512ebbb55a25ad428a3387d1018259967ccac126e09ea5a2f69f5a47f18f6690a9f72b874045601a04ff698656ca8c2c70ab0c63348ab427e65fd5d939befd4087f