Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:38
Static task
static1
Behavioral task
behavioral1
Sample
eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe
-
Size
20KB
-
MD5
eac66dbf6736f5768ed48f71da21f392
-
SHA1
6781ea8f567bbd7090c7251e62fb750799f39e39
-
SHA256
1c8950be7d83f1f3873f823ed0ba54addf10eeb6905303fec87f33e3aa8bc8d1
-
SHA512
d78b2472774d887c4058cda4c886f72b225a33993e8006821efd17e933a5ceb585ae2f2d5a0663f970efdc871f63ec0a132def02cb5c65917488f622812b0b7d
-
SSDEEP
384:ShQNm5ogigD0QKMt624t0BQKxqulLqJZfuYmcGB0T+axYC7dRt/peJXFmR:Sh3og9D0QKMtgaPIuOdUXa1pzxeJVmR
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 2148 Admin.exe 3724 Admin.exe 2904 Admin.exe 1156 Admin.exe 1332 Admin.exe 1572 Admin.exe 2020 Admin.exe 4380 Admin.exe 3108 Admin.exe 4696 Admin.exe 3208 Admin.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe /i" Admin.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Admin.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 2148 Admin.exe 2148 Admin.exe 3724 Admin.exe 3724 Admin.exe 2904 Admin.exe 2904 Admin.exe 1156 Admin.exe 1156 Admin.exe 1332 Admin.exe 1332 Admin.exe 1572 Admin.exe 1572 Admin.exe 2020 Admin.exe 2020 Admin.exe 4380 Admin.exe 4380 Admin.exe 3108 Admin.exe 3108 Admin.exe 4696 Admin.exe 4696 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe 3208 Admin.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2552 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 44 PID 2280 wrote to memory of 2148 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 82 PID 2280 wrote to memory of 2148 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 82 PID 2280 wrote to memory of 2148 2280 eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe 82 PID 2148 wrote to memory of 2560 2148 Admin.exe 45 PID 2148 wrote to memory of 3724 2148 Admin.exe 83 PID 2148 wrote to memory of 3724 2148 Admin.exe 83 PID 2148 wrote to memory of 3724 2148 Admin.exe 83 PID 3724 wrote to memory of 2744 3724 Admin.exe 48 PID 3724 wrote to memory of 2904 3724 Admin.exe 84 PID 3724 wrote to memory of 2904 3724 Admin.exe 84 PID 3724 wrote to memory of 2904 3724 Admin.exe 84 PID 2904 wrote to memory of 3652 2904 Admin.exe 57 PID 2904 wrote to memory of 1156 2904 Admin.exe 85 PID 2904 wrote to memory of 1156 2904 Admin.exe 85 PID 2904 wrote to memory of 1156 2904 Admin.exe 85 PID 1156 wrote to memory of 3864 1156 Admin.exe 58 PID 1156 wrote to memory of 1332 1156 Admin.exe 88 PID 1156 wrote to memory of 1332 1156 Admin.exe 88 PID 1156 wrote to memory of 1332 1156 Admin.exe 88 PID 1332 wrote to memory of 3952 1332 Admin.exe 59 PID 1332 wrote to memory of 1572 1332 Admin.exe 91 PID 1332 wrote to memory of 1572 1332 Admin.exe 91 PID 1332 wrote to memory of 1572 1332 Admin.exe 91 PID 1572 wrote to memory of 4016 1572 Admin.exe 60 PID 1572 wrote to memory of 2020 1572 Admin.exe 92 PID 1572 wrote to memory of 2020 1572 Admin.exe 92 PID 1572 wrote to memory of 2020 1572 Admin.exe 92 PID 2020 wrote to memory of 956 2020 Admin.exe 61 PID 2020 wrote to memory of 4380 2020 Admin.exe 93 PID 2020 wrote to memory of 4380 2020 Admin.exe 93 PID 2020 wrote to memory of 4380 2020 Admin.exe 93 PID 4380 wrote to memory of 2692 4380 Admin.exe 62 PID 4380 wrote to memory of 3108 4380 Admin.exe 95 PID 4380 wrote to memory of 3108 4380 Admin.exe 95 PID 4380 wrote to memory of 3108 4380 Admin.exe 95 PID 3108 wrote to memory of 1140 3108 Admin.exe 75 PID 3108 wrote to memory of 4696 3108 Admin.exe 96 PID 3108 wrote to memory of 4696 3108 Admin.exe 96 PID 3108 wrote to memory of 4696 3108 Admin.exe 96 PID 4696 wrote to memory of 2972 4696 Admin.exe 76 PID 4696 wrote to memory of 3208 4696 Admin.exe 97 PID 4696 wrote to memory of 3208 4696 Admin.exe 97 PID 4696 wrote to memory of 3208 4696 Admin.exe 97
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2560
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3864
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3952
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4016
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:956
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2692
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1140
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac66dbf6736f5768ed48f71da21f392_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r7⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r8⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r9⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r10⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r11⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\Admin.exeC:\Users\Admin\Admin.exe /r12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5eac66dbf6736f5768ed48f71da21f392
SHA16781ea8f567bbd7090c7251e62fb750799f39e39
SHA2561c8950be7d83f1f3873f823ed0ba54addf10eeb6905303fec87f33e3aa8bc8d1
SHA512d78b2472774d887c4058cda4c886f72b225a33993e8006821efd17e933a5ceb585ae2f2d5a0663f970efdc871f63ec0a132def02cb5c65917488f622812b0b7d