Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe
-
Size
661KB
-
MD5
eab9324b2da207d67b07a266d78d1c1f
-
SHA1
9a0bac16eef519363e294185c1f218f5c2897d18
-
SHA256
3b10a594c75f169a89ac0c61f6012acc43036fc13a073006ddbad0e122f0bd77
-
SHA512
07c182101bef3d4c85676c2174041f7ecd087281a247828da40da978abafb18dbbef4f88bebabff2eb11f2847190f60560afd6564fa8534f24c0e00433806092
-
SSDEEP
12288:I0VNfOrKDPWp0bPsYy4+4zF8AzN+QNvjF3Z4mxx4SJiV6Kn3jL:IzV6XyeZNR5QmXLiQKX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4828 winlogon.bat -
Loads dropped DLL 2 IoCs
pid Process 4828 winlogon.bat 4828 winlogon.bat -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Online Services\winlogon.bat eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe File created C:\Program Files\Online Services\LVDFCW.DAT eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe File created C:\Program Files\Online Services\winlogon.bat eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.bat -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ winlogon.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" winlogon.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" winlogon.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" winlogon.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" winlogon.bat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3300 eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe Token: SeDebugPrivilege 4828 winlogon.bat -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4828 winlogon.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab9324b2da207d67b07a266d78d1c1f_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
C:\Program Files\Online Services\winlogon.bat"C:\Program Files\Online Services\winlogon.bat"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD57133d3f50200d4d92183849c6bf6d90b
SHA1e7dac7471b67edf5de9e7f5d14c968f451223903
SHA25668c2e172b7f27b2fed4830ae66af900ca11000467f1c485c12dd3a3b4e19acc5
SHA512097abeaadf47f389f1cba1263f4e6eeb8d716a22051d1f62bd8d34046498ee91ab0bc0b4004312171e2754957f940c4372462a472ea149ea27e1e3bc82a8307f
-
Filesize
661KB
MD5eab9324b2da207d67b07a266d78d1c1f
SHA19a0bac16eef519363e294185c1f218f5c2897d18
SHA2563b10a594c75f169a89ac0c61f6012acc43036fc13a073006ddbad0e122f0bd77
SHA51207c182101bef3d4c85676c2174041f7ecd087281a247828da40da978abafb18dbbef4f88bebabff2eb11f2847190f60560afd6564fa8534f24c0e00433806092