Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe
-
Size
244KB
-
MD5
d104b4bd268324c54a26d52cae69b691
-
SHA1
2e024c710ad76c632747b48d46afd1af3a2dbd25
-
SHA256
9442f513416e352b7b3e340a05541751d48f17fde61b1766bdd11f25bb13fcc2
-
SHA512
e54f3e2bd3eb4cc64a4ad55200f7f28d23e79267e60dfbb438f128cc24d7ff268b065554e870f926dba41938ddf678a13479d40eae95200bd3639d130af97d37
-
SSDEEP
3072:6wJjo1JaESMaP/pqLFNH3xVyWlEFITYS+5yARrSTpVPsibicyETEJypEkpTeVLOf:PESMSBGPy1GGveNs+ihEIJypEWTevu
Malware Config
Signatures
-
Detects PlugX payload 25 IoCs
resource yara_rule behavioral2/memory/3332-1-0x0000000002290000-0x00000000022CA000-memory.dmp family_plugx behavioral2/memory/3332-2-0x0000000002290000-0x00000000022CA000-memory.dmp family_plugx behavioral2/memory/2992-18-0x00000000021A0000-0x00000000021DA000-memory.dmp family_plugx behavioral2/memory/2992-19-0x00000000021A0000-0x00000000021DA000-memory.dmp family_plugx behavioral2/memory/4408-23-0x0000000000D00000-0x0000000000D3A000-memory.dmp family_plugx behavioral2/memory/4408-24-0x0000000000D00000-0x0000000000D3A000-memory.dmp family_plugx behavioral2/memory/3784-43-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3332-47-0x0000000002290000-0x00000000022CA000-memory.dmp family_plugx behavioral2/memory/3784-51-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-52-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-53-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/2992-46-0x00000000021A0000-0x00000000021DA000-memory.dmp family_plugx behavioral2/memory/3784-42-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-41-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-29-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/4408-28-0x0000000000D00000-0x0000000000D3A000-memory.dmp family_plugx behavioral2/memory/3784-27-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-26-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/4988-58-0x0000000000770000-0x00000000007AA000-memory.dmp family_plugx behavioral2/memory/4988-61-0x0000000000770000-0x00000000007AA000-memory.dmp family_plugx behavioral2/memory/4988-60-0x0000000000770000-0x00000000007AA000-memory.dmp family_plugx behavioral2/memory/3784-62-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/4988-63-0x0000000000770000-0x00000000007AA000-memory.dmp family_plugx behavioral2/memory/3784-64-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx behavioral2/memory/3784-65-0x0000000000970000-0x00000000009AA000-memory.dmp family_plugx -
Executes dropped EXE 2 IoCs
pid Process 2992 NvSmart.exe 4408 NvSmart.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 NvSmart.exe 4408 NvSmart.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 205.252.144.228 Destination IP 61.139.2.69 Destination IP 202.98.96.68 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvSmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvSmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 43003600370041003000430043003200320045003800460041004100370034000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3784 svchost.exe 3784 svchost.exe 3784 svchost.exe 3784 svchost.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 3784 svchost.exe 3784 svchost.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 3784 svchost.exe 3784 svchost.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 3784 svchost.exe 3784 svchost.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 3784 svchost.exe 3784 svchost.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 4988 msiexec.exe 3784 svchost.exe 3784 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3784 svchost.exe 4988 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3332 d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe Token: SeTcbPrivilege 3332 d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe Token: SeDebugPrivilege 2992 NvSmart.exe Token: SeTcbPrivilege 2992 NvSmart.exe Token: SeDebugPrivilege 4408 NvSmart.exe Token: SeTcbPrivilege 4408 NvSmart.exe Token: SeDebugPrivilege 3784 svchost.exe Token: SeTcbPrivilege 3784 svchost.exe Token: SeDebugPrivilege 4988 msiexec.exe Token: SeTcbPrivilege 4988 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 4408 wrote to memory of 3784 4408 NvSmart.exe 87 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91 PID 3784 wrote to memory of 4988 3784 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d104b4bd268324c54a26d52cae69b691_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
C:\ProgramData\SxS\NvSmart.exe"C:\ProgramData\SxS\NvSmart.exe" 100 33321⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
C:\ProgramData\SxS\NvSmart.exe"C:\ProgramData\SxS\NvSmart.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 37843⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
5KB
MD5b97483b385bf30305d5377f6c19af3f2
SHA1c3a10feecf9ddad0d31d3d7b1b688fbfedc43057
SHA2565942f9befba6d295b9c63bdf9b3584fe52b01143557a8283c578329ab9a90818
SHA5122d10d0aa3b723baa0b08bd98d393fbe1346f9599a55fc4c8402ed08091d95a617f128b52a2fa68dcdc800ee0887f386e86afa19f0ded99e75f6a59fc341efe4f
-
Filesize
157KB
MD506963f6fc1be43958311b8f179eb6ee1
SHA19adb3fc2abc4a83497c178809c7d7d613a9a6da4
SHA256ef3afe758d2bef729993c649fe467192218df8c80592814f8b97a193709a208f
SHA512c24780d8b58aebaed38696c296f2847ebb8dbc16359f0312df3b0380990382a0d8a10863da8c2d6908bff6609bd3fd0251754615e2fc4b775377aef78899832d
-
Filesize
622B
MD54c40702f2a01d078022bd5d83ed19a14
SHA1d4e805be1f802bd5738d08f7dd7b5f7a059752b1
SHA2564bb473c963be50c34f529e4a175019f98dea39b772047a65283e964aa1765cf0
SHA512f764b9b7141550ed4760c9671d5869efdffeeac3d376576054cb2492feb253eb1014cb85568a042d10502f68e6d60dc8aa0c391a6896380a6168e015b39e3288