Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe
-
Size
268KB
-
MD5
d6a11be3feb4999e51e849c71a55572f
-
SHA1
04d585738444254dc86a456f0ea71f57e3e9924b
-
SHA256
879c25d4bc60ce8a71f9deb44ce9665d8889d444ab95961944586f8fd78515f4
-
SHA512
44b8245727152a18145f9d04bec915b931561e178d78640df928f1c734f57126acd25cf4ed5c8e2bd4d5b456515add8bf75a56f922cd21b1a78f887ce7639920
-
SSDEEP
6144:oFxMSF6RDudDquK750k36UrrCBaljHaxAOx:o8SFaI8qUrmoV
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2780 wjb.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 wjb.exe -
Loads dropped DLL 2 IoCs
pid Process 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjb.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2780 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2780 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2780 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2780 2684 d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\wjb.exe"C:\Users\Admin\AppData\Local\wjb.exe" -gav C:\Users\Admin\AppData\Local\Temp\d6a11be3feb4999e51e849c71a55572f_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD57892979fafe5a97a7c44ba4c9fa205d3
SHA17e281133476f70e615ba547380d35858d930431d
SHA256d135605322f4ad4c915e8a96e10f62e8ebee793120dce4477ce953678806567c
SHA5120d20979239bdb89835bfe3854c546cc0181049f1099c898e0a373c708577b33e455162c6799d3cd2dc3da1466280f30213fdad719755cb98831fc38d9239460c