Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 06:45
Behavioral task
behavioral1
Sample
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
-
Size
246KB
-
MD5
ed0ac3ec754cb2fa9cb4513394316573
-
SHA1
05564f7f4d5d05511346fd855b7dc7b2e67fb16b
-
SHA256
d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b
-
SHA512
461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc
-
SSDEEP
6144:guMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6Evy:g+YcUc6SBLLTSEgBAnhc1kG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe IEXPLOREi.exe" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/4236-0-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x00070000000233ff-5.dat upx behavioral2/memory/4236-12-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-13-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-14-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-15-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-16-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-17-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-18-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-19-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-20-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-21-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-22-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-23-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-24-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-25-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4236-26-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\IEXPLOREi.exe" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\g: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\h: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\l: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\r: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\v: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\a: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\e: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\m: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\o: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\s: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\w: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\x: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\y: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\j: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\k: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\z: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\p: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\q: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\t: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\u: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\b: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\n: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4236-12-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-13-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-14-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-15-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-16-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-17-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-18-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-19-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-20-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-21-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-22-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-23-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-24-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-25-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral2/memory/4236-26-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File created C:\Windows\SysWOW64\WORD.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WORD.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1788 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 82 PID 4236 wrote to memory of 1788 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 82 PID 4236 wrote to memory of 1788 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 82 PID 1788 wrote to memory of 2356 1788 cmd.exe 84 PID 1788 wrote to memory of 2356 1788 cmd.exe 84 PID 1788 wrote to memory of 2356 1788 cmd.exe 84 PID 4236 wrote to memory of 1688 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 85 PID 4236 wrote to memory of 1688 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 85 PID 4236 wrote to memory of 1688 4236 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 85 PID 1688 wrote to memory of 1572 1688 cmd.exe 87 PID 1688 wrote to memory of 1572 1688 cmd.exe 87 PID 1688 wrote to memory of 1572 1688 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5ed0ac3ec754cb2fa9cb4513394316573
SHA105564f7f4d5d05511346fd855b7dc7b2e67fb16b
SHA256d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b
SHA512461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc
-
Filesize
106B
MD5fb71860a9dd025e8485a61347c253ab1
SHA17ea28eaa88c587fe397a7b622d759759fd774003
SHA2563f1cf6881ca790bb89124bf8a7057b1b719925c066df4823f41f3cc7db4ccad3
SHA5123426638f2017cc24e21a9a997bb58a0490c2d863b9b66085920db5d186f818d990036e1cdb097959fc4893261112da5abb3bae11c5a620713fc64bf97d29a5a0