Analysis
-
max time kernel
146s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe
-
Size
408KB
-
MD5
eb45742bd01e4c54013139244d3153d0
-
SHA1
d3e62ee35c3291c9a900bfda9de5cb6889eb5a0d
-
SHA256
d7e592deb528644c5ead6b60fa2d16fbf9842ee87c6e41326072cb300ae1b6fa
-
SHA512
02b883f9c894dbb851dff3ade509e38d1f33ad889ff1ec214a8cec8519f6044fe3250064e8d4e959cf3b856c6028d5c786b90ebf4278da983b0ed7a38f77433a
-
SSDEEP
6144:KFRjs8wUu+hIx/Vv9YVCPpX0ce/R4t6dYFGQdMqzox3YTGeC4sKphZPgHELi6zoX:KFh0Jx/V/i//RWVmqz23xR4hZ2Elowo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000CBCA9B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000CBCA9B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000CBCA9B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000CBCA9B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000CBCA9B4EB2331\\043A6AEB00014973000CBCA9B4EB2331.exe" 043A6AEB00014973000CBCA9B4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6AEB00014973000CBCA9B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1560 043A6AEB00014973000CBCA9B4EB2331.exe 1560 043A6AEB00014973000CBCA9B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1560 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 29 PID 2468 wrote to memory of 1560 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 29 PID 2468 wrote to memory of 1560 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 29 PID 2468 wrote to memory of 1560 2468 eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\ProgramData\043A6AEB00014973000CBCA9B4EB2331\043A6AEB00014973000CBCA9B4EB2331.exe"C:\ProgramData\043A6AEB00014973000CBCA9B4EB2331\043A6AEB00014973000CBCA9B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\eb45742bd01e4c54013139244d3153d0_JaffaCakes118.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5eb45742bd01e4c54013139244d3153d0
SHA1d3e62ee35c3291c9a900bfda9de5cb6889eb5a0d
SHA256d7e592deb528644c5ead6b60fa2d16fbf9842ee87c6e41326072cb300ae1b6fa
SHA51202b883f9c894dbb851dff3ade509e38d1f33ad889ff1ec214a8cec8519f6044fe3250064e8d4e959cf3b856c6028d5c786b90ebf4278da983b0ed7a38f77433a