Analysis
-
max time kernel
133s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 08:09
Behavioral task
behavioral1
Sample
dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe
-
Size
52KB
-
MD5
dfcb9e0fc1f969697fd80cf34f5591e5
-
SHA1
70ecf32f351c72bea754c6998f54e9758907fb70
-
SHA256
9255b906667b466ae7cb5b54ee5ce57281730f77318845470d5ff226c696bc38
-
SHA512
c1c673e84ed53e9057c20f035c71bd3234546ecb33da8a6c8dbc0dfb5585106b9fbf4013ce86aafa1e5aa7def3a432fe5ffacba0961dfc65d99f3e105fcad080
-
SSDEEP
1536:a/BaV7B17CJ/I7vOhK2KNS8BifhDTLKkEzx:Nv7s/IzUKctfhDf8x
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Loads dropped DLL 5 IoCs
pid Process 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x000a000000016c89-5.dat upx behavioral1/memory/2220-6-0x0000000002A00000-0x0000000002A05000-memory.dmp upx behavioral1/memory/2220-27-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Windows NT\Accessories\iSrev.exe dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe File opened for modification C:\Program Files\Windows NT\Accessories\iSrev.exe dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe File created C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORER.EXE dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORER.EXE dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 explorer.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeBackupPrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeBackupPrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeBackupPrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeBackupPrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeRestorePrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeDebugPrivilege 2220 dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe Token: SeShutdownPrivilege 2864 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe 2864 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfcb9e0fc1f969697fd80cf34f5591e5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595737acaf3d7ad45f77a633370dcd820
SHA14cf36026deadc0b270ac803ff9cfef248517e59a
SHA25658c19ff73a30c44b6b4b349451e42cb4b9a0e642fc649d7e6850310eae956d1f
SHA51261c42456c258822099360ff88cf13e2da8eb62da2b598f37a026c409449a6d0bef36d15de64b1e4d9ab87a0f9a59c5e06d2117de7e2f43a186b5c7a6161c4f4b
-
Filesize
1KB
MD5e9245497ddb937ba761fd9673c6dc155
SHA1a9a38646770ff0f8144329cc98e9efe47de9583f
SHA2566190b851ebf8613945faed4a5439e5776a6910d0ce51097045ec7aba68bb54eb
SHA512315f87a05b77054708687a2484f924e8b0d1fd204bdd7cc194f8eb38c1e75bf67698ac216004d3ab563627ba328e8ef8c55e0b96c0c05880edff1f8c72d2ca71
-
Filesize
1KB
MD58860de15dd91df20a60ff07c978a14cf
SHA18cc5b1cb764eae57f24aa7c5c207084dc5e70311
SHA256bea0b13f418a8dae24f70af90b93b2ab0ce013fe8c3b01cc0047c8308e7f5253
SHA51238a793daf63ae5cce6adc05b4cc5842cc59e161b13785cb3d55ab446cb7fa6d74584a8968b72251e3298e2545d58ccc5499586f87a01f6b33746136748032cbc
-
Filesize
18KB
MD575841f234d770b70f4bfdf69c6e545c8
SHA12f1c96faa3ecf8288c36ffbc4e3605806c6bef74
SHA2562a38c06f76019cc1a411c2c84e06864942e3c2ff04e2daed50cbe509edabe36f
SHA5121314544ace13fe728ca9a2b247eb0bf157edbd624efe2de534d5ae0783535720e186364c805882fa5d0a2720b9aee06652f65dd1b4bb6bb846951346b1b3fa62