Analysis
-
max time kernel
71s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe
-
Size
46KB
-
MD5
d02c6a1c08633d671a9fd67af79881e0
-
SHA1
b08425894187326a1903e07968f087a854259580
-
SHA256
24b5dc63212cc54f3a0dea08097f2bdd23ea10ff24b9791ca3e2b1ef86edd684
-
SHA512
1b62736651c59e66f3d573c0d27146c1f1ea7fc0e6dbba00dc5f22d401f73e7dac72d9380aeaaee926251af6bbc2a35a5a34027cf4f027b34d3086a0edf9021c
-
SSDEEP
768:bcyf6tF/N72yzJGwRwqGvW4GmGHzUPJWfHhSrQONjWQoeR+9PoOI7e/w6Gh:vCF/NKyzgmfGq8XN5gNIS/w6Gh
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Loads dropped DLL 1 IoCs
pid Process 984 d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mimefiit.dIl d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F46BA37-BAA9-A3EC-4ABD-632DD4BDC9E1}\ = "mimefiit" d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F46BA37-BAA9-A3EC-4ABD-632DD4BDC9E1}\InprocServer32\ = "C:\\Windows\\SysWow64\\mimefiit.dIl" d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{6F46BA37-BAA9-A3EC-4ABD-632DD4BDC9E1} d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F46BA37-BAA9-A3EC-4ABD-632DD4BDC9E1}\InprocServer32 d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6F46BA37-BAA9-A3EC-4ABD-632DD4BDC9E1}\InprocServer32\ThreadingModel = "Apartment" d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: 33 2588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2588 AUDIODG.EXE Token: 33 2588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2588 AUDIODG.EXE Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d02c6a1c08633d671a9fd67af79881e0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:984
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x59c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5ce1574620f471d7cc3e3885ae604af0c
SHA1bb72ffcf6b9d4728e7cb901ee512dc7e75e7cd37
SHA2563ad27b959ef5e1cee681f071c5fc747353ad13d611fefbac5b5eb97c105765f8
SHA5129452306476dfde31087f1dff5dda9a0f74489e2e3a36642e6d5c8c0000ae244c0047cc53cdd18959ab565a4423a3da0ff20fca73563324e6aea0e6c817401cc8