Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 10:24
Behavioral task
behavioral1
Sample
00d81521402f6e5d949223fc13990889_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00d81521402f6e5d949223fc13990889_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00d81521402f6e5d949223fc13990889_JaffaCakes118.exe
-
Size
148KB
-
MD5
00d81521402f6e5d949223fc13990889
-
SHA1
8269f2b80d3f7321e6f661e27ec05bedacb85e7b
-
SHA256
b8675f263d052373f0142b7cc949438f11c6be291daf7fa722269dfa2a2ba06c
-
SHA512
535acd57d60b919c6342932e32daf773bf150a50813dd71275d6171cda27c6bfc77a43e729e340e3c0c7c94a947fdb5905bec6aaabae3008e52f8b7fbb6edb4b
-
SSDEEP
3072:yXfD+vx2t6bVojQzOkQB/ENma9T1Rbwo+UrdAd6KyEXEawHqgVGOj4q:kfKJ2gd/VNfXcuARyLKgVYq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RFWDown = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\00d81521402f6e5d949223fc13990889_JaffaCakes118.exe\" -auto" 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1556-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1556-8-0x0000000000400000-0x0000000000457000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAA2D3B1-4BB5-4a45-A17A-122773379D99} 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAA2D3B1-4BB5-4a45-A17A-122773379D99}\ProcID = "{F7CCF924-980C-654A-3231-333838303431}" 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe 1556 00d81521402f6e5d949223fc13990889_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00d81521402f6e5d949223fc13990889_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00d81521402f6e5d949223fc13990889_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD5775c9842cab9f31e23840e908558b622
SHA1b42931412f4c0c6d7c50d1bdca5add8440f67eb0
SHA2562e1753878926211701a5f798b15a384cae60678c5d77008de8d75bf0e7db4068
SHA5120c7a69d30be407bb028464d5bd44cefadf1fca67eefef06bfad6ada6f1fd3f553fd9b9a0c8556fbabeb62468ec684ceca3168e92f27b4419421308f352cc5407