Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe
-
Size
136KB
-
MD5
ef31db485b286c40abef2665b9c1a367
-
SHA1
e827428f5605104003f3e2dd35f959b22946ae65
-
SHA256
bf5544a581a28a9d087e1433942c5f7d795159e94b6bbd57e123d12ca9efef7c
-
SHA512
ddd1c7205b8fddb59b50467df8ca1ca427a49df83bd5b86ba241e653c873ccf71edba437ae9dce476dedc1abe04412d07778315186982b236df57f0f015f40cd
-
SSDEEP
3072:KRauDEef20RIcdaDTdj1ShUxu22K87UdEPf66u/yMr:TuD/uh1Shaf277UO66uN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3716 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Mshost Manager = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runonce.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Use FormSuggest = "yes" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "yes" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error = "no" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1601 = "0" ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 3716 svchost.exe 3716 svchost.exe 3716 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4776 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 83 PID 4040 wrote to memory of 4776 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 83 PID 4040 wrote to memory of 4776 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 83 PID 4776 wrote to memory of 1672 4776 Rundll32.exe 84 PID 4776 wrote to memory of 1672 4776 Rundll32.exe 84 PID 4776 wrote to memory of 1672 4776 Rundll32.exe 84 PID 4040 wrote to memory of 3716 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3716 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3716 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 85 PID 4040 wrote to memory of 1076 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 86 PID 4040 wrote to memory of 1076 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 86 PID 4040 wrote to memory of 1076 4040 ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe 86 PID 1672 wrote to memory of 1356 1672 runonce.exe 88 PID 1672 wrote to memory of 1356 1672 runonce.exe 88 PID 1672 wrote to memory of 1356 1672 runonce.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef31db485b286c40abef2665b9c1a367_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\driver.inf2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe -sysrun2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\QMftQA73.bat2⤵
- System Location Discovery: System Language Discovery
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD598f14f8ca35b5480969efb704f5f3be6
SHA114ffdb1292f0d7bdb02e83d7ceab96b20cafc95b
SHA25679783a33f5fc554990692d3a348bf14204261d61f7c81e725b114b2dbb1a0df7
SHA5123bfa66d9f55c601ff2bbd210aafc37083084265c646a05a44dba9e3a8bb80c2be9bae37cdbd7204b27a6d7277d92267b6706e5a9c14a266f29686788511a8457
-
Filesize
412B
MD556b521a68a5b98cc830de8ab0cbb48b9
SHA1336c2b765a93c69ee55333fb249ec563c03dac40
SHA256ef827ec876517a13b5e23fc2e60e75bf68ec28c7126167d2c6df873ca9fb622b
SHA512fee995c76ec5c4a2bd0a6ff0fd983dcf69755a191394d1524e2969a22c725522cc9f19b64193d90fb8a4a4d5d4a79d03f110f45bf8c8b043cfd56a7f8b00d6a9
-
Filesize
136KB
MD5ef31db485b286c40abef2665b9c1a367
SHA1e827428f5605104003f3e2dd35f959b22946ae65
SHA256bf5544a581a28a9d087e1433942c5f7d795159e94b6bbd57e123d12ca9efef7c
SHA512ddd1c7205b8fddb59b50467df8ca1ca427a49df83bd5b86ba241e653c873ccf71edba437ae9dce476dedc1abe04412d07778315186982b236df57f0f015f40cd