Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe
-
Size
16KB
-
MD5
06542ceb7da7e090f85b5d14c944ea14
-
SHA1
92f64564a700d515dbc576a471b75108beae2adc
-
SHA256
757e1128348193c4864741420f1a7398deca6064fdca2008517974707c2bf37a
-
SHA512
6c55411c6915ab67e6d2be26414e475281af5ca73328710591d3a63c45aac053cf176a6affc00a8b00153f8ccf4bf01960d813add16718f53ddd2493b1bf6516
-
SSDEEP
384:RuYlQAP1eZ97PlWOlLXTXcMqJy2rVd624Mg6Ed:tlCBhDTTgy2ORM+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 conlme.exe -
Loads dropped DLL 2 IoCs
pid Process 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\safety = "C:\\Program Files\\Common Files\\session\\conlme.exe" mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\session 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe File created C:\Program Files (x86)\WTG.hta 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\session\conlme.exe 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\session\conlme.exe 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\session conlme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conlme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 2 IoCs
pid Process 1000 taskkill.exe 3032 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.52cailing.com" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.52cailing.com" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.52cailing.com" mshta.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe Token: SeDebugPrivilege 1000 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 2956 conlme.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2120 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2120 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2120 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2120 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2368 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2368 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2368 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2368 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2440 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 32 PID 2424 wrote to memory of 2440 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 32 PID 2424 wrote to memory of 2440 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 32 PID 2424 wrote to memory of 2440 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 32 PID 2368 wrote to memory of 1000 2368 cmd.exe 35 PID 2368 wrote to memory of 1000 2368 cmd.exe 35 PID 2368 wrote to memory of 1000 2368 cmd.exe 35 PID 2368 wrote to memory of 1000 2368 cmd.exe 35 PID 2440 wrote to memory of 3032 2440 cmd.exe 36 PID 2440 wrote to memory of 3032 2440 cmd.exe 36 PID 2440 wrote to memory of 3032 2440 cmd.exe 36 PID 2440 wrote to memory of 3032 2440 cmd.exe 36 PID 2424 wrote to memory of 2956 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 39 PID 2424 wrote to memory of 2956 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 39 PID 2424 wrote to memory of 2956 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 39 PID 2424 wrote to memory of 2956 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 39 PID 2424 wrote to memory of 2804 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 40 PID 2424 wrote to memory of 2804 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 40 PID 2424 wrote to memory of 2804 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 40 PID 2424 wrote to memory of 2804 2424 06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe 40 PID 2956 wrote to memory of 1424 2956 conlme.exe 43 PID 2956 wrote to memory of 1424 2956 conlme.exe 43 PID 2956 wrote to memory of 1424 2956 conlme.exe 43 PID 2956 wrote to memory of 1424 2956 conlme.exe 43 PID 1424 wrote to memory of 1168 1424 cmd.exe 45 PID 1424 wrote to memory of 1168 1424 cmd.exe 45 PID 1424 wrote to memory of 1168 1424 cmd.exe 45 PID 1424 wrote to memory of 1168 1424 cmd.exe 45 PID 2956 wrote to memory of 1884 2956 conlme.exe 46 PID 2956 wrote to memory of 1884 2956 conlme.exe 46 PID 2956 wrote to memory of 1884 2956 conlme.exe 46 PID 2956 wrote to memory of 1884 2956 conlme.exe 46 PID 1884 wrote to memory of 1728 1884 cmd.exe 48 PID 1884 wrote to memory of 1728 1884 cmd.exe 48 PID 1884 wrote to memory of 1728 1884 cmd.exe 48 PID 1884 wrote to memory of 1728 1884 cmd.exe 48 PID 2956 wrote to memory of 1792 2956 conlme.exe 49 PID 2956 wrote to memory of 1792 2956 conlme.exe 49 PID 2956 wrote to memory of 1792 2956 conlme.exe 49 PID 2956 wrote to memory of 1792 2956 conlme.exe 49 PID 2956 wrote to memory of 2936 2956 conlme.exe 51 PID 2956 wrote to memory of 2936 2956 conlme.exe 51 PID 2956 wrote to memory of 2936 2956 conlme.exe 51 PID 2956 wrote to memory of 2936 2956 conlme.exe 51 PID 2956 wrote to memory of 640 2956 conlme.exe 53 PID 2956 wrote to memory of 640 2956 conlme.exe 53 PID 2956 wrote to memory of 640 2956 conlme.exe 53 PID 2956 wrote to memory of 640 2956 conlme.exe 53 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1168 attrib.exe 1728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\WTG.hta"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2120
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im cfmon.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im cfmon.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conlme.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conlme.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Program Files (x86)\Common Files\session\conlme.exe"C:\Program Files (x86)\Common Files\session\conlme.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1168
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\06542ceb7da7e090f85b5d14c944ea14_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802B
MD58d8586b64b6b825295b868f9c96395bc
SHA15074a618dd23f7fdc4c030bc1fabeefbd4af5a12
SHA25650b6cb797a430fac65407aaf1a1779d37799c146bee7c2b9bc03af70b839d063
SHA51234dea339960b1edf1cbaa0816901758c6327d8abb1df489cf3fd73ef90909053a8507e52f3658b8b552148a07b128814546cd77a8e09c1239b26d9c6ca9d8fb3
-
Filesize
12.0MB
MD5ad0bc213717101586721d8ab733f8f5b
SHA1fe9da4adde41115b7fad720d41e22960a7ce979a
SHA256ff0e6d4b34790044f3648a1f028d0712126c2203b0c044682e8b42b2ac9cbdf9
SHA512a625af622a4baafd1cd6b324348133d372219db1fac7e77c6be3ecd7b24e4a1f97d4400d78369ca1d35eae662d302979be149af19340eff9dda7b67b541fc90f