Analysis
-
max time kernel
148s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe
-
Size
416KB
-
MD5
eacfa7730063244f5b58d0de9fed2677
-
SHA1
951ffcbe94b006acf2d2c318ccaefe8859e840ed
-
SHA256
fe66d0e33ca7e11256b69698168740c284cf246675e17f93cbcf78cbb8ba3d20
-
SHA512
4ec278211c70a98eedcb7947af2de2b64d1a6cfe4a7416b013445b0cd05f46e2e87bbd8e793c2057df633dc73705de3501353d0aaa638d8901de0caed1039a96
-
SSDEEP
6144:8FXJEEL1/uM1ZBEp9RZ5b46ijbozptjdJ7QEc5Jg+FBSBNiNdSkgMpDn0:8FBRh94b4xjbozptH7QDfFsBNiNdSI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C4D2EB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C4D2EB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000C4D2EB4EB2331 = "C:\\ProgramData\\043A6A5B00014973000C4D2EB4EB2331\\043A6A5B00014973000C4D2EB4EB2331.exe" 043A6A5B00014973000C4D2EB4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000C4D2EB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 043A6A5B00014973000C4D2EB4EB2331.exe 2880 043A6A5B00014973000C4D2EB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2880 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2880 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2880 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 29 PID 2172 wrote to memory of 2880 2172 eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\ProgramData\043A6A5B00014973000C4D2EB4EB2331\043A6A5B00014973000C4D2EB4EB2331.exe"C:\ProgramData\043A6A5B00014973000C4D2EB4EB2331\043A6A5B00014973000C4D2EB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\eacfa7730063244f5b58d0de9fed2677_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5eacfa7730063244f5b58d0de9fed2677
SHA1951ffcbe94b006acf2d2c318ccaefe8859e840ed
SHA256fe66d0e33ca7e11256b69698168740c284cf246675e17f93cbcf78cbb8ba3d20
SHA5124ec278211c70a98eedcb7947af2de2b64d1a6cfe4a7416b013445b0cd05f46e2e87bbd8e793c2057df633dc73705de3501353d0aaa638d8901de0caed1039a96