Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe
-
Size
28KB
-
MD5
ee1a5d0030fc44006f94f02dea2814ca
-
SHA1
fea3289f603f4e310992b4f218e5d90826180bef
-
SHA256
84dc89e2d19d53dcb61204a6bf84fbe8395fde26ee561f14f79c61f24da2b5db
-
SHA512
2c219e6154c419a6d02b2e0ba2c54ecfe63f5cf6c7139d60e8c73c8cda1820c74083da246279924f567cc67b0ae907037123dc675872c703bc4f4ec8f5c1e2ac
-
SSDEEP
192:2h8QGIjbhRm1llmJUVMNdZriONjBAqHD2llv:2CQ17m1llVuLr7NlAqHD2Dv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe c:\\windows\\shut.exe" ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe -
Blocks application from running via registry modification 2 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\is = "icesword.exe" ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\360safe = "c:\\windows\\shut.exe" ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\360safe = "c:\\windows\\shut.exe" ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\shut.exe ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe File opened for modification \??\c:\windows\shut.exe ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2620 shutdown.exe Token: SeRemoteShutdownPrivilege 2620 shutdown.exe Token: SeShutdownPrivilege 2740 shutdown.exe Token: SeRemoteShutdownPrivilege 2740 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1760 wrote to memory of 796 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 30 PID 1760 wrote to memory of 796 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 30 PID 1760 wrote to memory of 796 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 30 PID 1760 wrote to memory of 796 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 30 PID 796 wrote to memory of 2620 796 cmd.exe 32 PID 796 wrote to memory of 2620 796 cmd.exe 32 PID 796 wrote to memory of 2620 796 cmd.exe 32 PID 796 wrote to memory of 2620 796 cmd.exe 32 PID 1760 wrote to memory of 1308 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 34 PID 1760 wrote to memory of 1308 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 34 PID 1760 wrote to memory of 1308 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 34 PID 1760 wrote to memory of 1308 1760 ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe 34 PID 1308 wrote to memory of 2740 1308 cmd.exe 36 PID 1308 wrote to memory of 2740 1308 cmd.exe 36 PID 1308 wrote to memory of 2740 1308 cmd.exe 36 PID 1308 wrote to memory of 2740 1308 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee1a5d0030fc44006f94f02dea2814ca_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Blocks application from running via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c shutdown -r -t 902⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 903⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c shutdown -r -t 002⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 003⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:3000
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2520