Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe
-
Size
627KB
-
MD5
e21ce3b569be0bce5f0524bf09851718
-
SHA1
93fcdd20188e4d2cf5c1cdb048d680dfb46ce91e
-
SHA256
448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5
-
SHA512
315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f
-
SSDEEP
12288:dXghTYSNmQIDFye/FoJYJCZFweKwarO2PjdHc8ES3J:2N1mQID3/FoKJCZXKdCMXES
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/2264-10-0x0000000004E90000-0x0000000004E9A000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "\\System\\DefenderSecuritySystem.exe" e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\System\\DefenderSecuritySystem.exe" e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2264 set thread context of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 3108 set thread context of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3432 cmd.exe 1756 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1756 PING.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe Token: 33 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe Token: SeDebugPrivilege 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe Token: SeDebugPrivilege 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Token: 33 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Token: SeDebugPrivilege 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Token: 33 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3444 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 2264 wrote to memory of 3648 2264 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 94 PID 3648 wrote to memory of 3108 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 97 PID 3648 wrote to memory of 3108 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 97 PID 3648 wrote to memory of 3108 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 97 PID 3648 wrote to memory of 3432 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 98 PID 3648 wrote to memory of 3432 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 98 PID 3648 wrote to memory of 3432 3648 e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe 98 PID 3432 wrote to memory of 1756 3432 cmd.exe 100 PID 3432 wrote to memory of 1756 3432 cmd.exe 100 PID 3432 wrote to memory of 1756 3432 cmd.exe 100 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101 PID 3108 wrote to memory of 3444 3108 e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_jaffacakes118\e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_jaffacakes118\e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_jaffacakes118\e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_jaffacakes118\e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1756
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1088
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request107.12.20.2.in-addr.arpaIN PTRResponse107.12.20.2.in-addr.arpaIN PTRa2-20-12-107deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestbellamycous.ddns.netIN AResponsebellamycous.ddns.netIN A184.105.237.195
-
Remote address:8.8.8.8:53Request195.237.105.184.in-addr.arpaIN PTRResponse195.237.105.184.in-addr.arpaIN CNAME195.192-26.237.105.184.in-addr.arpa195.192-26.237.105.184.in-addr.arpaIN PTR184-105-237-195sinkholeshadowserverorg
-
390 B 288 B 8 7
-
194 B 88 B 4 2
-
490 B 288 B 10 7
-
98 B 48 B 2 1
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
107.12.20.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
66 B 82 B 1 1
DNS Request
bellamycous.ddns.net
DNS Response
184.105.237.195
-
74 B 154 B 1 1
DNS Request
195.237.105.184.in-addr.arpa
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e21ce3b569be0bce5f0524bf09851718_JaffaCakes118.exe.log
Filesize706B
MD52ef5ef69dadb8865b3d5b58c956077b8
SHA1af2d869bac00685c745652bbd8b3fe82829a8998
SHA256363502eb2a4e53ba02d2d85412b901fcf8e06de221736bdffa949799ef3d21e3
SHA51266d4db5dd17d88e1d54ea0df3a7211a503dc4355de701259cefccc9f2e4e3ced9534b700099ffbb089a5a3acb082011c80b61801aa14aff76b379ce8f90d4fd3
-
C:\Users\Admin\AppData\Local\Temp\e21ce3b569be0bce5f0524bf09851718_jaffacakes118\e21ce3b569be0bce5f0524bf09851718_jaffacakes118.exe
Filesize627KB
MD5e21ce3b569be0bce5f0524bf09851718
SHA193fcdd20188e4d2cf5c1cdb048d680dfb46ce91e
SHA256448fe83a93d937d4435f81bc208ed2ea46d6e983e13f4f4ec9a69d1c25d3ecd5
SHA512315a46d109b3a91420ce508bedefec3d47cfecb910014852fd2c86d18c2121a35649513980257214e898d135855141dceeb1031bc0189c482e37de2f8a7d858f
-
Filesize
64B
MD5ee5307a1d8232528053e31e4f06db543
SHA1fa396f832e17866985ff416b9478b27dcc5b0c4a
SHA2561c130f34d2c54ea63b8c7b243b5103761f586a94cf3c4db4ab7230331613e596
SHA5125ae62622eb78b04a5cdf443f71d6e396df61153a4f704ffefe806dac5fefe144f9bca4fa7233fdb35563ed4031d9e0bddd19c450b697c30a90ad8a735df87184