Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 02:26
Behavioral task
behavioral1
Sample
ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe
-
Size
904KB
-
MD5
ce6efd71b4b45b11f2e16af3cbad5cd3
-
SHA1
d67f32889b99beaf1d442c55daa7fbd18d40e398
-
SHA256
a1eb4ba0ad6c7ce0fc019241027cf897e80ad7f7574df3818ddb6b3e632d5ffa
-
SHA512
71457532956303c19e5c83cc2f44831bb596efcf39e58e8bd26e6ecf66a445d4eadc4222163c118eaf8c409ddb342db2a70fb7f1b01fc74e8f53d5808ef04e9f
-
SSDEEP
24576:nEMr6nh44pUnG76M+ce0BQ3/UmRNGLUqdHS9VEtG:EMrO44+brceaIsoQwqdHS96tG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1088 taskmgr.exe 4292 taskmgr.exe 1776 taskmgr.exe -
resource yara_rule behavioral2/memory/1868-0-0x0000000000400000-0x0000000000868000-memory.dmp upx behavioral2/files/0x00090000000234af-11.dat upx behavioral2/memory/1088-18-0x0000000000400000-0x0000000000868000-memory.dmp upx behavioral2/memory/1868-22-0x0000000000400000-0x0000000000868000-memory.dmp upx behavioral2/memory/1776-31-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1776-35-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1776-37-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1088-41-0x0000000000400000-0x0000000000868000-memory.dmp upx behavioral2/memory/1776-53-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Manager = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Task Manager\\taskmgr.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1088 set thread context of 4292 1088 taskmgr.exe 93 PID 1088 set thread context of 1776 1088 taskmgr.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 taskmgr.exe 4292 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4292 taskmgr.exe Token: SeDebugPrivilege 4292 taskmgr.exe Token: SeDebugPrivilege 1776 taskmgr.exe Token: SeDebugPrivilege 1732 iexplore.exe Token: SeDebugPrivilege 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 1088 taskmgr.exe 1776 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2700 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 88 PID 1868 wrote to memory of 2700 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 88 PID 1868 wrote to memory of 2700 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 88 PID 2700 wrote to memory of 2656 2700 cmd.exe 91 PID 2700 wrote to memory of 2656 2700 cmd.exe 91 PID 2700 wrote to memory of 2656 2700 cmd.exe 91 PID 1868 wrote to memory of 1088 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 92 PID 1868 wrote to memory of 1088 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 92 PID 1868 wrote to memory of 1088 1868 ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe 92 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 4292 1088 taskmgr.exe 93 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 1088 wrote to memory of 1776 1088 taskmgr.exe 94 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95 PID 4292 wrote to memory of 1732 4292 taskmgr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce6efd71b4b45b11f2e16af3cbad5cd3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FRoJV.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Task Manager" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5af6c7aadedd88029c4cf2b4bbe061f58
SHA12b4dbdba41a6f2f7276bb47d66c00ce14c3cc022
SHA2563c5cae645ef6d6b37b4d022b0b60b4e4c7335922d6a3c991b2b29837fffdded3
SHA5128d5adb2dba711f638480fbf71e9ccfade031dc6f91064ff973b3140ebd2cfd900cc0252726974f84066548ca9f8108ff0025eb17dfc1618f18877bca90df900a
-
Filesize
904KB
MD5ce6efd71b4b45b11f2e16af3cbad5cd3
SHA1d67f32889b99beaf1d442c55daa7fbd18d40e398
SHA256a1eb4ba0ad6c7ce0fc019241027cf897e80ad7f7574df3818ddb6b3e632d5ffa
SHA51271457532956303c19e5c83cc2f44831bb596efcf39e58e8bd26e6ecf66a445d4eadc4222163c118eaf8c409ddb342db2a70fb7f1b01fc74e8f53d5808ef04e9f