Analysis
-
max time kernel
91s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe
-
Size
450KB
-
MD5
ed752ab9f0148a0c3bd4c08eb9ae4e52
-
SHA1
78fe39a3f53bda3761628bb3d92cfdb20f09adaf
-
SHA256
4d3af26d845a57cbee4d736e0fcc1a19955216706ad7d2af8d14f111d31167e7
-
SHA512
1c7ab93a6a67a468fc6b84f8d93536386154e46e0ef350a7f71fa77386329951bb3998b5c757dc80b2180e6552a3075f9bc95e134aaaf92a11748087495e1b51
-
SSDEEP
12288:y2f2hB4yVe0ZU1NQhD94nt1pNBtSkIlaasU3:yIGFV9Dct1plSFlaa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3496 reg.exe 3260 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4068 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 85 PID 2740 wrote to memory of 4068 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 85 PID 2740 wrote to memory of 4068 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 85 PID 4068 wrote to memory of 2468 4068 cmd.exe 87 PID 4068 wrote to memory of 2468 4068 cmd.exe 87 PID 4068 wrote to memory of 2468 4068 cmd.exe 87 PID 4068 wrote to memory of 2104 4068 cmd.exe 88 PID 4068 wrote to memory of 2104 4068 cmd.exe 88 PID 4068 wrote to memory of 2104 4068 cmd.exe 88 PID 2104 wrote to memory of 3076 2104 cmd.exe 89 PID 2104 wrote to memory of 3076 2104 cmd.exe 89 PID 2104 wrote to memory of 3076 2104 cmd.exe 89 PID 4068 wrote to memory of 2732 4068 cmd.exe 90 PID 4068 wrote to memory of 2732 4068 cmd.exe 90 PID 4068 wrote to memory of 2732 4068 cmd.exe 90 PID 2732 wrote to memory of 3496 2732 cmd.exe 91 PID 2732 wrote to memory of 3496 2732 cmd.exe 91 PID 2732 wrote to memory of 3496 2732 cmd.exe 91 PID 2740 wrote to memory of 2744 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 99 PID 2740 wrote to memory of 2744 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 99 PID 2740 wrote to memory of 2744 2740 ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe 99 PID 2744 wrote to memory of 4416 2744 cmd.exe 101 PID 2744 wrote to memory of 4416 2744 cmd.exe 101 PID 2744 wrote to memory of 4416 2744 cmd.exe 101 PID 2744 wrote to memory of 1624 2744 cmd.exe 102 PID 2744 wrote to memory of 1624 2744 cmd.exe 102 PID 2744 wrote to memory of 1624 2744 cmd.exe 102 PID 1624 wrote to memory of 4848 1624 cmd.exe 103 PID 1624 wrote to memory of 4848 1624 cmd.exe 103 PID 1624 wrote to memory of 4848 1624 cmd.exe 103 PID 2744 wrote to memory of 4476 2744 cmd.exe 104 PID 2744 wrote to memory of 4476 2744 cmd.exe 104 PID 2744 wrote to memory of 4476 2744 cmd.exe 104 PID 4476 wrote to memory of 3260 4476 cmd.exe 105 PID 4476 wrote to memory of 3260 4476 cmd.exe 105 PID 4476 wrote to memory of 3260 4476 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed752ab9f0148a0c3bd4c08eb9ae4e52_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c system.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.execmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f3⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3496
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c system.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c \"C:\Users\Admin\AppData\Roaming\svchost.exe\" /f3⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /V Shell /D "explorer.exe \"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /D "\"C:\Users\Admin\AppData\Roaming\svchost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320B
MD5ef9cacb4552c5493eb5cbd94d0f39e81
SHA10dc30c13aacfd87522492bfb9b3da8c42f2f9350
SHA2567c2c7be57123305fe8870fa6e88e8b9a734fa98eeac66c633b0a2d3643dca7b3
SHA51296aee7748833ca2166a1ac741cbc6f6f6ce6f41c51bd6c002684a8b2dbf451aa635f96bd1d1d54ddc539a0525a4bd716ffe775740f4e2fb0f3a232a2567ee14c