Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
ef5af683c8dda88d48ee3497b56c61ba
-
SHA1
693b34cf74e25234de5358cc335dab83745bfdc8
-
SHA256
cb1c37b8d1e441cfdb5c026488a9b6bc2e1ce365a22ed4c2189dc3436bcaa9f7
-
SHA512
83824a52df3d6175137cdc47b8d2c133537dc294ebca6ba425d74867ec9aeabb811f86fcabb721e6b5ef07657bf3203408df76774cf68f547f64e08805eb75b1
-
SSDEEP
49152:ZQTBALttl2+FrMiwx3CWrCnsR6NWQNlVKWLqNw5zu7T9N4es4Q:ZQoPhEt0NBlVxbzuH9NlQ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts AV Protection 2011v121.exe -
Executes dropped EXE 2 IoCs
pid Process 3284 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe -
resource yara_rule behavioral2/memory/3688-10-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/3688-11-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/3688-16-0x0000000000400000-0x00000000008E4000-memory.dmp upx behavioral2/memory/3688-15-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/3284-27-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/3284-28-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/3284-37-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/2124-71-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/2124-82-0x0000000000400000-0x00000000008E9800-memory.dmp upx behavioral2/memory/2124-104-0x0000000000400000-0x00000000008E9800-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EG5aQH6dW8R9T8234A = "C:\\Windows\\system32\\AV Protection 2011v121.exe" ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IlONtxA0uSiFpGa8234A = "C:\\Users\\Admin\\AppData\\Roaming\\GIBrzPNyc1v2n4m\\AV Protection 2011v121.exe" AV Protection 2011v121.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\AV Protection 2011v121.exe ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe File created C:\Windows\SysWOW64\AV Protection 2011v121.exe AV Protection 2011v121.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV Protection 2011v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV Protection 2011v121.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4288 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3688 ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe 3284 AV Protection 2011v121.exe 3284 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe 2124 AV Protection 2011v121.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3284 3688 ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe 91 PID 3688 wrote to memory of 3284 3688 ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe 91 PID 3688 wrote to memory of 3284 3688 ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe 91 PID 3284 wrote to memory of 2124 3284 AV Protection 2011v121.exe 96 PID 3284 wrote to memory of 2124 3284 AV Protection 2011v121.exe 96 PID 3284 wrote to memory of 2124 3284 AV Protection 2011v121.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\AV Protection 2011v121.exeC:\Windows\system32\AV Protection 2011v121.exe 5985C:\Users\Admin\AppData\Local\Temp\ef5af683c8dda88d48ee3497b56c61ba_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Roaming\GIBrzPNyc1v2n4m\AV Protection 2011v121.exeC:\Users\Admin\AppData\Roaming\GIBrzPNyc1v2n4m\AV Protection 2011v121.exe 5985C:\Windows\SysWOW64\AV Protection 2011v121.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1304,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:81⤵PID:908
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD56c9a891db06547e1e1cc3c5ff4a22c27
SHA14521d38398725460ca939984d423e70573601ef5
SHA2561c50999f26af623872a4db09d78fc1afe5b13955206cd6d031c78a7dc9592858
SHA51291b2c8f04001222933d2826e5307a948a509e1517f2268fe3200a5511af6c704bde68132d063e6bcd6e5608b1b144f0d59e61766e00b60ef95e974b20aabfbd6
-
Filesize
607B
MD59e6a40d59b1beb5b02f62842667c0fc4
SHA1a8755fe9153d87035f211153b01fe0ae6c00955b
SHA256b41e19148d48f3d30662845daa57846cdabeda5d605913a4bdad86ad54de8143
SHA512446390a724fa235bd438f36f6a38c1773cc9cfffcb13b8b7bdeaf67341628353848ea43f134fc4500f13b7be29944b745556f16dd92c1b53841bcf7f887c58cd
-
Filesize
1KB
MD5adfc23ece339cd62c54e3ddff4432be0
SHA1d14a561ac388b60d7348ee1ac2584f7770243b7f
SHA25665c85e0273d8b3230363c4662d2f74bbd0a7e76f9db63581c3c18f476679f09c
SHA51234807295c7ef984ee26f5695bb992a49713e67b937b70ab786525fe6320d9c8019be2ccf7c060e0374baa37ae5bdf462ba88f4e86cfb8a11a964eadc7c095ac4
-
Filesize
2.8MB
MD5ef5af683c8dda88d48ee3497b56c61ba
SHA1693b34cf74e25234de5358cc335dab83745bfdc8
SHA256cb1c37b8d1e441cfdb5c026488a9b6bc2e1ce365a22ed4c2189dc3436bcaa9f7
SHA51283824a52df3d6175137cdc47b8d2c133537dc294ebca6ba425d74867ec9aeabb811f86fcabb721e6b5ef07657bf3203408df76774cf68f547f64e08805eb75b1
-
Filesize
1KB
MD57eab0ddcbf3cec31ec7731b53fdb09d0
SHA1bd75e8a2e47b1153d901874b4ecaff0c1222d149
SHA256a0c9a8935e73279c9a1891afdfa494667cad34cf55063ad912c00ef3706cb280
SHA512aff2f2bfd15f2840e0939b8fd73fea30797394d9fe5d14d02c86df6fe2ee5d28dccdfc3838777b8678c7c8278d3ee286dca219d4344b8782bca52a6dd1e9f4ca