Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 20:03
Behavioral task
behavioral1
Sample
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
-
Size
396KB
-
MD5
e0ef6f0918e52efaea280dac53989603
-
SHA1
133c07681b08f1e0e606cfdb075a9b7654f65ca8
-
SHA256
4a521febae3f7300e9232613f86e396cb498bba34813dada818dd076b741fceb
-
SHA512
12258e35f40c5f661688c02506879a77c603ed6370aa6c4f97a39a2a614877ca01d8a13814759520e1c1f6f5928f07debdf38c7be48cc7c5d62e8a1ce98f78f0
-
SSDEEP
12288:Nbti6v7MUMBGiKva6AcWE6C/idBoTHOSDGP+f/n:ltiEMkiyZAcWE6rdGCSDGmfP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{VwMNWke1-5dpp-CjdB-fU30-SvSpp9tNZwHU} rdt66jud56u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{VwMNWke1-5dpp-CjdB-fU30-SvSpp9tNZwHU}\I78heaLDnoZYDzg = "\"C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe\" /ActiveX" rdt66jud56u.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rdt66jud56u.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 828 rdt66jud56u.exe 2700 rdt66jud56u.exe -
Loads dropped DLL 7 IoCs
pid Process 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 828 rdt66jud56u.exe 2700 rdt66jud56u.exe -
resource yara_rule behavioral1/memory/2492-0-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/files/0x0009000000016de9-36.dat upx behavioral1/memory/2492-40-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/2700-47-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-48-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/828-51-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/2700-49-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-46-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-45-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-43-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-57-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-58-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-60-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-62-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-64-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-66-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-68-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-70-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-72-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-74-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-76-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-78-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-80-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-82-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2700-84-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\5stur4urs45ju = "C:\\Users\\Admin\\AppData\\Roaming\\rdt66jud56u.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\I78heaLDnoZYDzg = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\I78heaLDnoZYDzg = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdt66jud56u.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ rdt66jud56u.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 2700 828 rdt66jud56u.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdt66jud56u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdt66jud56u.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 828 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe 2700 rdt66jud56u.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2328 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2328 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2328 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2328 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2856 2328 cmd.exe 33 PID 2328 wrote to memory of 2856 2328 cmd.exe 33 PID 2328 wrote to memory of 2856 2328 cmd.exe 33 PID 2328 wrote to memory of 2856 2328 cmd.exe 33 PID 2492 wrote to memory of 828 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 34 PID 2492 wrote to memory of 828 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 34 PID 2492 wrote to memory of 828 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 34 PID 2492 wrote to memory of 828 2492 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 34 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35 PID 828 wrote to memory of 2700 828 rdt66jud56u.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259447212.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "5stur4urs45ju" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe"C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\rdt66jud56u.exeC:\Users\Admin\AppData\Roaming\rdt66jud56u.exe3⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD565eeac27df79bacb998372ee71453edc
SHA17a755eae5b89c7ac2c79b9e67184788f84390976
SHA256dfe19a43addc0791805bb20f0fd46d6f110456a0dc1a29dc8464646980f4cfb6
SHA5128d00674a04309c0baf3e09cc25d96c0946c99537e16f99834a20602e0742e15191d3afd38f5c2b2e160f0ee0f161788f0c94f77856f2be80995a2a1398f73d51
-
Filesize
396KB
MD5e0ef6f0918e52efaea280dac53989603
SHA1133c07681b08f1e0e606cfdb075a9b7654f65ca8
SHA2564a521febae3f7300e9232613f86e396cb498bba34813dada818dd076b741fceb
SHA51212258e35f40c5f661688c02506879a77c603ed6370aa6c4f97a39a2a614877ca01d8a13814759520e1c1f6f5928f07debdf38c7be48cc7c5d62e8a1ce98f78f0
-
Filesize
93KB
MD51173123287198dce1eb831f04e28352c
SHA139d650f4297c990a7ffaa7dc3b6d0ef903c9bd14
SHA25665d4582e135c774d9c827ae08de8b77f199ee934f13d1a0537df4f5d18f590ba
SHA512e9fdb6e808b0f3ed850fb364d48609a9726fd41ad138594fc04f8d48d5672aec3aaa76af236f07c4263c053dc539f99009e74491adb03c885190dcce78f0cede