Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe
-
Size
27KB
-
MD5
f5ce9e806ba61f77798aa99bca4c75e9
-
SHA1
d234f5f145428fe65be09a9e7bf080c57f8809e8
-
SHA256
36c9b48c955a66e909c13ce4b89cc4dd8cdc39f9c371ff8a09c30d9388658b45
-
SHA512
1884f833232bdc62f86c4e4af13da62348c9652dc02b1221237e7b96a4f5c8dfa89076a9584443b9d091e984cb4d557ed17378de5b4b99c13e06ec6d40be566d
-
SSDEEP
768:U1BuPk5ncpi7LW1N5BN9HbV7U2hRNY3nldQd5N5J8H:UyM875bZDNY3c5N5s
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3448 9129837.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool = "C:\\Windows\\9129837.exe" f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool = "C:\\Windows\\9129837.exe" 9129837.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\9129837.exe f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe File opened for modification C:\Windows\9129837.exe f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe File created C:\Windows\new_drv.sys 9129837.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9129837.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3448 9129837.exe 3448 9129837.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe Token: SeDebugPrivilege 3448 9129837.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3448 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 82 PID 3500 wrote to memory of 3448 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 82 PID 3500 wrote to memory of 3448 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 82 PID 3500 wrote to memory of 932 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 83 PID 3500 wrote to memory of 932 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 83 PID 3500 wrote to memory of 932 3500 f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe 83 PID 3448 wrote to memory of 616 3448 9129837.exe 5 PID 3448 wrote to memory of 684 3448 9129837.exe 7 PID 3448 wrote to memory of 776 3448 9129837.exe 8 PID 3448 wrote to memory of 800 3448 9129837.exe 9 PID 3448 wrote to memory of 808 3448 9129837.exe 10 PID 3448 wrote to memory of 900 3448 9129837.exe 11 PID 3448 wrote to memory of 952 3448 9129837.exe 12 PID 3448 wrote to memory of 316 3448 9129837.exe 13 PID 3448 wrote to memory of 388 3448 9129837.exe 14 PID 3448 wrote to memory of 612 3448 9129837.exe 15 PID 3448 wrote to memory of 1028 3448 9129837.exe 16 PID 3448 wrote to memory of 1040 3448 9129837.exe 17 PID 3448 wrote to memory of 1052 3448 9129837.exe 18 PID 3448 wrote to memory of 1076 3448 9129837.exe 19 PID 3448 wrote to memory of 1176 3448 9129837.exe 20 PID 3448 wrote to memory of 1212 3448 9129837.exe 21 PID 3448 wrote to memory of 1308 3448 9129837.exe 22 PID 3448 wrote to memory of 1352 3448 9129837.exe 23 PID 3448 wrote to memory of 1364 3448 9129837.exe 24 PID 3448 wrote to memory of 1372 3448 9129837.exe 25 PID 3448 wrote to memory of 1440 3448 9129837.exe 26 PID 3448 wrote to memory of 1496 3448 9129837.exe 27 PID 3448 wrote to memory of 1580 3448 9129837.exe 28 PID 3448 wrote to memory of 1628 3448 9129837.exe 29 PID 3448 wrote to memory of 1668 3448 9129837.exe 30 PID 3448 wrote to memory of 1744 3448 9129837.exe 31 PID 3448 wrote to memory of 1760 3448 9129837.exe 32 PID 3448 wrote to memory of 1888 3448 9129837.exe 33 PID 3448 wrote to memory of 1992 3448 9129837.exe 34 PID 3448 wrote to memory of 2012 3448 9129837.exe 35 PID 3448 wrote to memory of 1144 3448 9129837.exe 36 PID 3448 wrote to memory of 1680 3448 9129837.exe 37 PID 3448 wrote to memory of 2084 3448 9129837.exe 38 PID 3448 wrote to memory of 2124 3448 9129837.exe 39 PID 3448 wrote to memory of 2212 3448 9129837.exe 40 PID 3448 wrote to memory of 2256 3448 9129837.exe 41 PID 3448 wrote to memory of 2264 3448 9129837.exe 42 PID 3448 wrote to memory of 2368 3448 9129837.exe 43 PID 3448 wrote to memory of 2472 3448 9129837.exe 44 PID 3448 wrote to memory of 2548 3448 9129837.exe 45 PID 3448 wrote to memory of 2556 3448 9129837.exe 46 PID 3448 wrote to memory of 2588 3448 9129837.exe 47 PID 3448 wrote to memory of 2628 3448 9129837.exe 48 PID 3448 wrote to memory of 2880 3448 9129837.exe 49 PID 3448 wrote to memory of 2896 3448 9129837.exe 50 PID 3448 wrote to memory of 2968 3448 9129837.exe 51 PID 3448 wrote to memory of 3008 3448 9129837.exe 52 PID 3448 wrote to memory of 2512 3448 9129837.exe 53 PID 3448 wrote to memory of 3312 3448 9129837.exe 54 PID 3448 wrote to memory of 3456 3448 9129837.exe 56 PID 3448 wrote to memory of 3564 3448 9129837.exe 57 PID 3448 wrote to memory of 3744 3448 9129837.exe 58 PID 3448 wrote to memory of 3836 3448 9129837.exe 59 PID 3448 wrote to memory of 3900 3448 9129837.exe 60 PID 3448 wrote to memory of 3992 3448 9129837.exe 61 PID 3448 wrote to memory of 4172 3448 9129837.exe 62 PID 3448 wrote to memory of 5004 3448 9129837.exe 64 PID 3448 wrote to memory of 3088 3448 9129837.exe 66
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:808
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2968
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3744
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3836
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3900
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3992
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4172
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4196
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4996
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3544
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4968
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1052
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1440
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1144
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2264
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2548
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3312
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\9129837.exe"C:\Windows\9129837.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\abcdefg.bat" "C:\Users\Admin\AppData\Local\Temp\f5ce9e806ba61f77798aa99bca4c75e9_JaffaCakes118.exe""3⤵
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3108
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4156
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4200
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240925-1031.dmp1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80B
MD53c2c2719c39678a7ef5013eb16b6f6ef
SHA1323dfea7b524e2781dc2a4584a72a22981eee9a0
SHA2569356b2010f4fca9a15ea990821154c5b8a87ffe472741ad089d08c746df218d5
SHA51247174f9a28ab1309b31c71b11742c0d055a3319e485a44d62452a58fc4af67740d8342552862977b51e79da562f90d92d1b9c9dbbb14e7f2369cbe67133ba71c
-
Filesize
27KB
MD5f5ce9e806ba61f77798aa99bca4c75e9
SHA1d234f5f145428fe65be09a9e7bf080c57f8809e8
SHA25636c9b48c955a66e909c13ce4b89cc4dd8cdc39f9c371ff8a09c30d9388658b45
SHA5121884f833232bdc62f86c4e4af13da62348c9652dc02b1221237e7b96a4f5c8dfa89076a9584443b9d091e984cb4d557ed17378de5b4b99c13e06ec6d40be566d