Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
-
Size
450KB
-
MD5
ed752ab9f0148a0c3bd4c08eb9ae4e52
-
SHA1
78fe39a3f53bda3761628bb3d92cfdb20f09adaf
-
SHA256
4d3af26d845a57cbee4d736e0fcc1a19955216706ad7d2af8d14f111d31167e7
-
SHA512
1c7ab93a6a67a468fc6b84f8d93536386154e46e0ef350a7f71fa77386329951bb3998b5c757dc80b2180e6552a3075f9bc95e134aaaf92a11748087495e1b51
-
SSDEEP
12288:y2f2hB4yVe0ZU1NQhD94nt1pNBtSkIlaasU3:yIGFV9Dct1plSFlaa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2572 reg.exe 2732 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1280 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 30 PID 2304 wrote to memory of 1280 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 30 PID 2304 wrote to memory of 1280 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 30 PID 2304 wrote to memory of 1280 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2564 1280 cmd.exe 32 PID 1280 wrote to memory of 2564 1280 cmd.exe 32 PID 1280 wrote to memory of 2564 1280 cmd.exe 32 PID 1280 wrote to memory of 2564 1280 cmd.exe 32 PID 1280 wrote to memory of 2396 1280 cmd.exe 33 PID 1280 wrote to memory of 2396 1280 cmd.exe 33 PID 1280 wrote to memory of 2396 1280 cmd.exe 33 PID 1280 wrote to memory of 2396 1280 cmd.exe 33 PID 2396 wrote to memory of 1692 2396 cmd.exe 34 PID 2396 wrote to memory of 1692 2396 cmd.exe 34 PID 2396 wrote to memory of 1692 2396 cmd.exe 34 PID 2396 wrote to memory of 1692 2396 cmd.exe 34 PID 1280 wrote to memory of 1916 1280 cmd.exe 35 PID 1280 wrote to memory of 1916 1280 cmd.exe 35 PID 1280 wrote to memory of 1916 1280 cmd.exe 35 PID 1280 wrote to memory of 1916 1280 cmd.exe 35 PID 1916 wrote to memory of 2572 1916 cmd.exe 36 PID 1916 wrote to memory of 2572 1916 cmd.exe 36 PID 1916 wrote to memory of 2572 1916 cmd.exe 36 PID 1916 wrote to memory of 2572 1916 cmd.exe 36 PID 2304 wrote to memory of 2804 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 37 PID 2304 wrote to memory of 2804 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 37 PID 2304 wrote to memory of 2804 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 37 PID 2304 wrote to memory of 2804 2304 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 37 PID 2804 wrote to memory of 2876 2804 cmd.exe 39 PID 2804 wrote to memory of 2876 2804 cmd.exe 39 PID 2804 wrote to memory of 2876 2804 cmd.exe 39 PID 2804 wrote to memory of 2876 2804 cmd.exe 39 PID 2804 wrote to memory of 2800 2804 cmd.exe 40 PID 2804 wrote to memory of 2800 2804 cmd.exe 40 PID 2804 wrote to memory of 2800 2804 cmd.exe 40 PID 2804 wrote to memory of 2800 2804 cmd.exe 40 PID 2800 wrote to memory of 2756 2800 cmd.exe 41 PID 2800 wrote to memory of 2756 2800 cmd.exe 41 PID 2800 wrote to memory of 2756 2800 cmd.exe 41 PID 2800 wrote to memory of 2756 2800 cmd.exe 41 PID 2804 wrote to memory of 2724 2804 cmd.exe 42 PID 2804 wrote to memory of 2724 2804 cmd.exe 42 PID 2804 wrote to memory of 2724 2804 cmd.exe 42 PID 2804 wrote to memory of 2724 2804 cmd.exe 42 PID 2724 wrote to memory of 2732 2724 cmd.exe 43 PID 2724 wrote to memory of 2732 2724 cmd.exe 43 PID 2724 wrote to memory of 2732 2724 cmd.exe 43 PID 2724 wrote to memory of 2732 2724 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c system.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.execmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c system.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320B
MD5ef9cacb4552c5493eb5cbd94d0f39e81
SHA10dc30c13aacfd87522492bfb9b3da8c42f2f9350
SHA2567c2c7be57123305fe8870fa6e88e8b9a734fa98eeac66c633b0a2d3643dca7b3
SHA51296aee7748833ca2166a1ac741cbc6f6f6ce6f41c51bd6c002684a8b2dbf451aa635f96bd1d1d54ddc539a0525a4bd716ffe775740f4e2fb0f3a232a2567ee14c