Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe
-
Size
402KB
-
MD5
0640a920f7d1edb078af752c1b5a15da
-
SHA1
43f13caaf29695f0e0931845966afeed7fd25aa1
-
SHA256
9c62c303966de57132fed88d15dbc8e0c0645e99bdf915af59f4619abf614b80
-
SHA512
81c68415f874d8f05de7c9710c9e397f80fd6c0048ba9ee27f2dcaf59e6fb6eb0bfedbd6a79710e00207e59cdb96314fd643e6e7a795567a8d04e17172bd5203
-
SSDEEP
6144:i2T4xoGo5nWYZwttnk/zLmIcWD+XHKbJYkc+kIiBtURorouLfYGxrDJ+MTCwiEl:b4xoB5WAcnKE0Q0JixPRouf1FzCwiK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\gengdian¦½.exe,C:\\WINDOWS\\java\\classes\\smss.exe," 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "auqiawxf¦À.exe" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\Spooler\ImagePath = "%SystemRoot%\\system32\\ssjspoolsv.exe" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Spooler\ImagePath = "%SystemRoot%\\system32\\ssjspoolsv.exe" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "ssjlogonui.exe" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\batfile\shell\open\command 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\batfile\shell\open 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\batfile 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\batfile\shell 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe 1484 0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 316 explorer.exe 1964 explorer.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 316 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe Token: SeShutdownPrivilege 1964 explorer.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 316 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe 1964 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0640a920f7d1edb078af752c1b5a15da_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Blocks application from running via registry modification
- Sets service image path in registry
- Modifies system executable filetype association
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:316
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1