Analysis
-
max time kernel
86s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe
-
Size
62KB
-
MD5
e24a9f05a6de6de56699c5816b769778
-
SHA1
49ef5d7447dbfb8a433d810cb5b01a6f13c94c16
-
SHA256
a15e8d04dd3b8cc47cf5150070688ad125cd66fc076bdad3c68b1f2e78d86363
-
SHA512
1c758d0aa1fa671f1d9b6a43fd9079be50d0d09c2cf522800370eace534a984a7e656a7c939880e08d3e5be2f701f92d56eed5d6fe4dc81aea40d24f7fdb5c0e
-
SSDEEP
1536:K8rT+onNbyXs8StJlUUInB8Wra8GpK1SvNfB4:NrionNbgTElE1rN+hlfi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,c:\\WINDOWS\\e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe" e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 7 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\g: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\h: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\i: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\k: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\l: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened (read-only) \??\m: e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 16 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\f:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\h:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\k:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\k:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\e:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\e:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\g:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\i:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\l:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\l:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\m:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\f:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\h:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\i:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\g:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\m:\Autorun.inf e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\WINDOWS\saslogww.txt e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\c:\WINDOWS\e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\c:\WINDOWS\e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File created \??\c:\WINDOWS\Listsas.txt e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe File opened for modification \??\c:\WINDOWS\Listsas.txt e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ddcc79b6b2a901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e1d4d2cd977d0d48a2a7a4ad56025bf800000000020000000000106600000001000020000000c6eafda4d35df485b991c0fe2e033d704dc97c9ac69ea8445da87bd5cf4de580000000000e80000000020000200000001bbeafb2d5c9dcffa75a2e9ef3385fb276eaef99e3dd0c28acc4ee634476c8ee200000004cac14eb9722b16ad894595bce9bd2d180926945b3df22683023751a7c74ed444000000008a85ac804c502f9d6bb5c70754fbb949efc383be7b4dc9127dd9dda18385effd8895b9a953eaca3bb1af521352e30b52a9b4d18af5a1bbc2f88794f3decf681 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8009d479b6b2a901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "1178065773" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A2E8DEA2-1EA9-11BE-98CD-5ED96FC588C3} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e1d4d2cd977d0d48a2a7a4ad56025bf800000000020000000000106600000001000020000000cf45ffa602b6f571ff7f4dad2d78a7ecb49472a9d8c11943b7a95f254f8b918a000000000e80000000020000200000004a3785be6c980bc9ef3c0130e599cfe16084915bae63eba68efbd6d6d3e5a666200000000b2eb41101d2b5e806b28c41e61a772d849184229694da850f663b98c13a721240000000f5c273db8667c2c2dbdde59f7c04913e356aa2eb7f81421e411431fd97e8350ce585eb2d736a3bf6d1bac4eab18f13148bf18b1709f508469e2ee6227d0b4e92 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2060 e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4632 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4632 IEXPLORE.EXE 4632 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4632 2060 e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe 93 PID 2060 wrote to memory of 4632 2060 e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe 93 PID 4632 wrote to memory of 2040 4632 IEXPLORE.EXE 94 PID 4632 wrote to memory of 2040 4632 IEXPLORE.EXE 94 PID 4632 wrote to memory of 2040 4632 IEXPLORE.EXE 94 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = 95000000 e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e24a9f05a6de6de56699c5816b769778_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2060 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.sinavip.net/A.asp?Id=2702214235 202⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4632 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e097e5ecc0f5b114602a6f8a62d0fa88
SHA1a43c8b621b2bab3cbae773b5552c1627e3b42863
SHA256e1a6de51d582b8d9eb0dd8e3dccf2ac51d4e7b7fdd22776ef72faf024b809742
SHA512637602f61dc42ea1dde48c1bd4ed5644d5c0485a1931f38c1c0fbd4b711ec1998d41de5a053e2be182e6fdb52808a4e8b91f6864739bda542bd9a556f65f83fd
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
4KB
MD52078a69bf68e43b1a9b3ea4caa01cdeb
SHA1705231be423060e06cf18dc76ea61c629898cbb0
SHA256e471a9f02d1bb949155890f497d7b6188766b88154bf5aecc713d0ce4513723a
SHA5124e2032974a289732be0d2d059cde6f60635e06a3748e9f478cc14b88013a7f45d7a764d32ee68f2d237f1300aff24df6167592a818b3273d7339e6f5430736e7
-
Filesize
25B
MD54c45edd71bc8644931eb70a590d3c9b1
SHA1bb8ae14b976d90af8936cee51aa065af3d83f395
SHA256bdf27a53b493a4dda61186f6885e83a6fd2bb97ed72be4b96c5a12073e15abb1
SHA51207ad2fd734bbee094cd6c690b697894e6e684881648ebde8b3634e9a9b5f1f141ef3f9b9d1a1d3922ad2697884ddeb3a4976f4c0aece6fba5af0ecbd70cbbeaf
-
Filesize
62KB
MD5e24a9f05a6de6de56699c5816b769778
SHA149ef5d7447dbfb8a433d810cb5b01a6f13c94c16
SHA256a15e8d04dd3b8cc47cf5150070688ad125cd66fc076bdad3c68b1f2e78d86363
SHA5121c758d0aa1fa671f1d9b6a43fd9079be50d0d09c2cf522800370eace534a984a7e656a7c939880e08d3e5be2f701f92d56eed5d6fe4dc81aea40d24f7fdb5c0e