Analysis
-
max time kernel
149s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe
-
Size
342KB
-
MD5
c8e0efe285f6053d6838053edce63174
-
SHA1
1a07dcf0e7564ab7cfae3f1e811930f090d1b652
-
SHA256
742a9957a5aaf196b9331396bf4f719c4fb6fe5f12a0c4eca9499bae1af3722e
-
SHA512
fdf31ea8c6d18333c2e8fb66158198b39720812228aab37cf1d77685ebb2ac8853ed8a84aa93a0f11fc97993de92f63f2fa6862f55c8099de0522f6475bc99f1
-
SSDEEP
6144:7t42S9Beu7vLKU5m0+iiZHJoa5qT0Ag6oFFRBGnGCRxX6K+:XyBe2Y0+iiZpJNANCFRBGGcl6z
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1072 043A6A5B00014973000AA325B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 043A6A5B00014973000AA325B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AA325B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AA325B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AA325B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000AA325B4EB2331 = "C:\\ProgramData\\043A6A5B00014973000AA325B4EB2331\\043A6A5B00014973000AA325B4EB2331.exe" 043A6A5B00014973000AA325B4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000AA325B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1072 043A6A5B00014973000AA325B4EB2331.exe 1072 043A6A5B00014973000AA325B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1072 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 30 PID 1496 wrote to memory of 1072 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 30 PID 1496 wrote to memory of 1072 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 30 PID 1496 wrote to memory of 1072 1496 c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\ProgramData\043A6A5B00014973000AA325B4EB2331\043A6A5B00014973000AA325B4EB2331.exe"C:\ProgramData\043A6A5B00014973000AA325B4EB2331\043A6A5B00014973000AA325B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\c8e0efe285f6053d6838053edce63174_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD5c8e0efe285f6053d6838053edce63174
SHA11a07dcf0e7564ab7cfae3f1e811930f090d1b652
SHA256742a9957a5aaf196b9331396bf4f719c4fb6fe5f12a0c4eca9499bae1af3722e
SHA512fdf31ea8c6d18333c2e8fb66158198b39720812228aab37cf1d77685ebb2ac8853ed8a84aa93a0f11fc97993de92f63f2fa6862f55c8099de0522f6475bc99f1