Analysis
-
max time kernel
8s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:45
Behavioral task
behavioral1
Sample
eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe
-
Size
516KB
-
MD5
eb5cf6d6717307d5eaa965b807a9e240
-
SHA1
e56aa07a1eb81ddd675fe48576154a63fac0e856
-
SHA256
ec9bb94c88b9c00457beacc9e8d7908dcaf1509b2e3fc9f9a6fd4c6bb5820aa2
-
SHA512
dd8b89ed71d68d093429760b4574f738cf5afe6f31ccad74f33eb012374b2fcb194fbeb5165c1d1b2811fc76ac0d102b697dae7ced3ca8f2e04a35dbf2559e3c
-
SSDEEP
12288:mtT+tYipsDYmltm6YXh3Y9ta/E7fFjcnffTtYfrWKB1yAQkWqgWzoV:lmMWt1YBCNdjcnf76jZB8AQg8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\gog.exe" eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2440-0-0x0000000000400000-0x0000000000591000-memory.dmp upx behavioral1/memory/2440-5-0x0000000000400000-0x0000000000591000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe 2440 eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2440
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2192
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:3040