Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe
-
Size
184KB
-
MD5
d54e43c271a8d379e2c77b9902ede544
-
SHA1
9d46aa0d4621335fb1a8496564f64f5a7edf1b4e
-
SHA256
998ff68cb64a06a233007f450b9156dfed770cc4cf6321e0e2ac2400db1be281
-
SHA512
5e75c52914f83676a36d505834754447ac0c86dc2bfba454cb4e6de9dea1289f0ba32253bc7036dc90ef1181e9bb6fea03b81a88adced295192bc2ac04b9ddba
-
SSDEEP
3072:HnIBtQnE7OhssdWJ5jy392aCmCbBqOS2zxLLjD6+s3WTe0K+cnJJUwlJQ4AX40bJ:Cqvhssdu5jyYaCmCQOS2z4f3WI+cJKwo
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2656 soele.exe 1408 soele.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2720DE1C-CF6E-4884-D683-1A5AE10C9016} = "C:\\Users\\Admin\\AppData\\Roaming\\Onufpu\\soele.exe" Explorer.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 3476 Explorer.EXE 3476 Explorer.EXE 3476 Explorer.EXE 3476 Explorer.EXE 1408 soele.exe 1408 soele.exe 1408 soele.exe 1408 soele.exe 3352 RuntimeBroker.exe 3352 RuntimeBroker.exe 3352 RuntimeBroker.exe 3352 RuntimeBroker.exe 3848 RuntimeBroker.exe 3848 RuntimeBroker.exe 3848 RuntimeBroker.exe 3848 RuntimeBroker.exe 1956 DllHost.exe 1956 DllHost.exe 1956 DllHost.exe 1956 DllHost.exe 1408 soele.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 372 set thread context of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 2656 set thread context of 1408 2656 soele.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 236 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\MuiCache BackgroundTaskHost.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings\MuiCache backgroundTaskHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe 2656 soele.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE Token: SeBackupPrivilege 4140 vssvc.exe Token: SeRestorePrivilege 4140 vssvc.exe Token: SeAuditPrivilege 4140 vssvc.exe Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE Token: SeShutdownPrivilege 3928 RuntimeBroker.exe Token: SeShutdownPrivilege 3928 RuntimeBroker.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3476 Explorer.EXE 3476 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 372 wrote to memory of 392 372 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 83 PID 392 wrote to memory of 2656 392 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 84 PID 392 wrote to memory of 2656 392 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 84 PID 392 wrote to memory of 4788 392 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 86 PID 392 wrote to memory of 4788 392 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 86 PID 392 wrote to memory of 4788 392 d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe 86 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 2656 wrote to memory of 1408 2656 soele.exe 88 PID 1408 wrote to memory of 2996 1408 soele.exe 50 PID 1408 wrote to memory of 2996 1408 soele.exe 50 PID 1408 wrote to memory of 2996 1408 soele.exe 50 PID 1408 wrote to memory of 3028 1408 soele.exe 51 PID 1408 wrote to memory of 3028 1408 soele.exe 51 PID 1408 wrote to memory of 3028 1408 soele.exe 51 PID 1408 wrote to memory of 408 1408 soele.exe 52 PID 1408 wrote to memory of 408 1408 soele.exe 52 PID 1408 wrote to memory of 408 1408 soele.exe 52 PID 1408 wrote to memory of 3476 1408 soele.exe 56 PID 1408 wrote to memory of 3476 1408 soele.exe 56 PID 1408 wrote to memory of 3476 1408 soele.exe 56 PID 1408 wrote to memory of 3568 1408 soele.exe 57 PID 1408 wrote to memory of 3568 1408 soele.exe 57 PID 1408 wrote to memory of 3568 1408 soele.exe 57 PID 1408 wrote to memory of 3776 1408 soele.exe 58 PID 1408 wrote to memory of 3776 1408 soele.exe 58 PID 1408 wrote to memory of 3776 1408 soele.exe 58 PID 1408 wrote to memory of 3868 1408 soele.exe 59 PID 1408 wrote to memory of 3868 1408 soele.exe 59 PID 1408 wrote to memory of 3868 1408 soele.exe 59 PID 1408 wrote to memory of 3928 1408 soele.exe 60 PID 1408 wrote to memory of 3928 1408 soele.exe 60 PID 1408 wrote to memory of 3928 1408 soele.exe 60 PID 1408 wrote to memory of 4020 1408 soele.exe 61 PID 1408 wrote to memory of 4020 1408 soele.exe 61 PID 1408 wrote to memory of 4020 1408 soele.exe 61 PID 1408 wrote to memory of 4104 1408 soele.exe 62 PID 1408 wrote to memory of 4104 1408 soele.exe 62 PID 1408 wrote to memory of 4104 1408 soele.exe 62 PID 1408 wrote to memory of 3976 1408 soele.exe 75 PID 1408 wrote to memory of 3976 1408 soele.exe 75 PID 1408 wrote to memory of 3976 1408 soele.exe 75 PID 1408 wrote to memory of 3100 1408 soele.exe 76 PID 1408 wrote to memory of 3100 1408 soele.exe 76 PID 1408 wrote to memory of 3100 1408 soele.exe 76 PID 1408 wrote to memory of 2412 1408 soele.exe 81 PID 1408 wrote to memory of 2412 1408 soele.exe 81 PID 1408 wrote to memory of 2412 1408 soele.exe 81 PID 1408 wrote to memory of 2656 1408 soele.exe 84 PID 1408 wrote to memory of 2656 1408 soele.exe 84 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3028
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:408
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54e43c271a8d379e2c77b9902ede544_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Roaming\Onufpu\soele.exe"C:\Users\Admin\AppData\Roaming\Onufpu\soele.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\Onufpu\soele.exe"C:\Users\Admin\AppData\Roaming\Onufpu\soele.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_5ba5752a.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:236
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3776
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3868
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4020
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4104
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3100
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Modifies registry class
PID:2412
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵
- Modifies registry class
PID:3520
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3352
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD5d14e717b767f1ba2a2d0c345f2d10849
SHA1c4e5379b08924b8df6bf2b51e86dbdcd3766a648
SHA2568d69b2909f59762a998419cead557e341c6030311a4445194a4c3836b84856a2
SHA512d2fb6c51730f46fba9e98fb9451cacb1392cc835e030bfbd537682355e5d80cba4b7fd52b6ab064354c9433258b54f6cca7a83bb4ac253d5e1aec84918d6d015
-
Filesize
67KB
MD543ef99d50bfbf07e56d110dab0185cdf
SHA190d6f533add085939c40d661a64944322a719d1d
SHA25676be85b90ca0224db40c99e93008da3f4ab927ea9cb8bad1c3de7d0f10fc38b1
SHA5122eb172ebee820d2a7615a054a74915539f3391cc9b64757b12ad1b98c5dbb078f4609bbdc72e71cf22bd61e3053547dd495c7fe911235dcea71fb0bddbb36478