Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 20:03
Behavioral task
behavioral1
Sample
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe
-
Size
396KB
-
MD5
e0ef6f0918e52efaea280dac53989603
-
SHA1
133c07681b08f1e0e606cfdb075a9b7654f65ca8
-
SHA256
4a521febae3f7300e9232613f86e396cb498bba34813dada818dd076b741fceb
-
SHA512
12258e35f40c5f661688c02506879a77c603ed6370aa6c4f97a39a2a614877ca01d8a13814759520e1c1f6f5928f07debdf38c7be48cc7c5d62e8a1ce98f78f0
-
SSDEEP
12288:Nbti6v7MUMBGiKva6AcWE6C/idBoTHOSDGP+f/n:ltiEMkiyZAcWE6rdGCSDGmfP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VwMNWke1-5dpp-CjdB-fU30-SvSpp9tNZwHU} rdt66jud56u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VwMNWke1-5dpp-CjdB-fU30-SvSpp9tNZwHU}\I78heaLDnoZYDzg = "\"C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe\" /ActiveX" rdt66jud56u.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rdt66jud56u.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4588 rdt66jud56u.exe 4616 rdt66jud56u.exe -
Loads dropped DLL 2 IoCs
pid Process 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe -
resource yara_rule behavioral2/memory/3476-0-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral2/files/0x00090000000233b8-11.dat upx behavioral2/memory/3476-20-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral2/memory/4616-26-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-23-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-29-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-32-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-31-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4588-30-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral2/memory/4616-27-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-42-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-43-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-46-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-48-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-50-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-52-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-54-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-56-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-58-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-60-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-62-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-64-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-66-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4616-70-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5stur4urs45ju = "C:\\Users\\Admin\\AppData\\Roaming\\rdt66jud56u.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\I78heaLDnoZYDzg = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\I78heaLDnoZYDzg = "C:\\Users\\Admin\\AppData\\Roaming\\w34yae5u45uhyrt5.exe" rdt66jud56u.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdt66jud56u.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ rdt66jud56u.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 4616 4588 rdt66jud56u.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdt66jud56u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdt66jud56u.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 4588 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe 4616 rdt66jud56u.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3476 wrote to memory of 3780 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 87 PID 3476 wrote to memory of 3780 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 87 PID 3476 wrote to memory of 3780 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 87 PID 3780 wrote to memory of 3592 3780 cmd.exe 90 PID 3780 wrote to memory of 3592 3780 cmd.exe 90 PID 3780 wrote to memory of 3592 3780 cmd.exe 90 PID 3476 wrote to memory of 4588 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 91 PID 3476 wrote to memory of 4588 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 91 PID 3476 wrote to memory of 4588 3476 e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe 91 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94 PID 4588 wrote to memory of 4616 4588 rdt66jud56u.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0ef6f0918e52efaea280dac53989603_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240625203.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "5stur4urs45ju" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe"C:\Users\Admin\AppData\Roaming\rdt66jud56u.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\rdt66jud56u.exeC:\Users\Admin\AppData\Roaming\rdt66jud56u.exe3⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD565eeac27df79bacb998372ee71453edc
SHA17a755eae5b89c7ac2c79b9e67184788f84390976
SHA256dfe19a43addc0791805bb20f0fd46d6f110456a0dc1a29dc8464646980f4cfb6
SHA5128d00674a04309c0baf3e09cc25d96c0946c99537e16f99834a20602e0742e15191d3afd38f5c2b2e160f0ee0f161788f0c94f77856f2be80995a2a1398f73d51
-
Filesize
93KB
MD51173123287198dce1eb831f04e28352c
SHA139d650f4297c990a7ffaa7dc3b6d0ef903c9bd14
SHA25665d4582e135c774d9c827ae08de8b77f199ee934f13d1a0537df4f5d18f590ba
SHA512e9fdb6e808b0f3ed850fb364d48609a9726fd41ad138594fc04f8d48d5672aec3aaa76af236f07c4263c053dc539f99009e74491adb03c885190dcce78f0cede
-
Filesize
396KB
MD5e0ef6f0918e52efaea280dac53989603
SHA1133c07681b08f1e0e606cfdb075a9b7654f65ca8
SHA2564a521febae3f7300e9232613f86e396cb498bba34813dada818dd076b741fceb
SHA51212258e35f40c5f661688c02506879a77c603ed6370aa6c4f97a39a2a614877ca01d8a13814759520e1c1f6f5928f07debdf38c7be48cc7c5d62e8a1ce98f78f0