Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
-
Size
262KB
-
MD5
ee702697678035626ed75f89fa7bcdb5
-
SHA1
8f3a29e20470462d2cf1f66bcc14b6d90ebfc605
-
SHA256
08bd4c6afb3cf682b949bc4b1853a2e98b14d37569dd61d21724e6cc0c75ef53
-
SHA512
e23981d512c2892097d502cd9da929a34e9f2e824ccaaca5cb7c11bccb425f6a33247db042fb9cf9eb323e99909647312687234220ba759ab7014e81b2abffae
-
SSDEEP
6144:lqCbbe+R6SjMbnysLWN682NCYRDXlcTwgLnJF8UF7w68q5:pbe+IlbnBiNHYDVYwgLJFNF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 svchost.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\ff61085e\desktop.ini svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ff700df1 = "C:\\Windows\\apppatch\\svchost.exe" ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ff700df1 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2920 svchost.exe 2920 svchost.exe 2920 svchost.exe 2920 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1496 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2920 1496 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 89 PID 1496 wrote to memory of 2920 1496 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 89 PID 1496 wrote to memory of 2920 1496 ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops desktop.ini file(s)
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4608,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3264 /prefetch:81⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5f674b597d674621d7e5f25ca1191a973
SHA11e7d38a99c669177c93ff7e04001959a878e8775
SHA256b57344400ec4a4fd1be87577f31131dc689b081d0958180f51916679dc47bd5f
SHA512a8140b50b8baf8a14f8d1f165832e63fb7a1f69b9dad052232603a4522cc043c1d256b688d4c6b30e4e3f8c062b140fb2844068d40a67b96e7f8972b53753f7a