Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe
-
Size
660KB
-
MD5
0ffad55d5e663fb3e79d4adee5536d59
-
SHA1
57aeec3b9aff5720be14319794352d23dee6fd27
-
SHA256
101d94163010b36353461ca833ca44154d23f4fe33f3e14c12cc42e681137a51
-
SHA512
d896e756eea08bac3252d664ae640c459b9bb964aee6a3ae61578ab3455480e46c3afe49470161c98c6f2060275a84aa62edbcc4180ac215e313c41d8abe0245
-
SSDEEP
12288:S5cgSKYTTJ/rq1mwlafNr5XjgCqemTuSZpKdaAL1:SWQAT9OMwlafF5TgCmTNZsdf
Malware Config
Extracted
latentbot
corbyshitnig.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\AQ2IPDSKWY.exe = "C:\\Users\\Admin\\AppData\\Roaming\\AQ2IPDSKWY.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 explorer.exe -
Loads dropped DLL 4 IoCs
pid Process 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 5068 reg.exe 2160 reg.exe 1568 reg.exe 2444 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe Token: 1 2608 explorer.exe Token: SeCreateTokenPrivilege 2608 explorer.exe Token: SeAssignPrimaryTokenPrivilege 2608 explorer.exe Token: SeLockMemoryPrivilege 2608 explorer.exe Token: SeIncreaseQuotaPrivilege 2608 explorer.exe Token: SeMachineAccountPrivilege 2608 explorer.exe Token: SeTcbPrivilege 2608 explorer.exe Token: SeSecurityPrivilege 2608 explorer.exe Token: SeTakeOwnershipPrivilege 2608 explorer.exe Token: SeLoadDriverPrivilege 2608 explorer.exe Token: SeSystemProfilePrivilege 2608 explorer.exe Token: SeSystemtimePrivilege 2608 explorer.exe Token: SeProfSingleProcessPrivilege 2608 explorer.exe Token: SeIncBasePriorityPrivilege 2608 explorer.exe Token: SeCreatePagefilePrivilege 2608 explorer.exe Token: SeCreatePermanentPrivilege 2608 explorer.exe Token: SeBackupPrivilege 2608 explorer.exe Token: SeRestorePrivilege 2608 explorer.exe Token: SeShutdownPrivilege 2608 explorer.exe Token: SeDebugPrivilege 2608 explorer.exe Token: SeAuditPrivilege 2608 explorer.exe Token: SeSystemEnvironmentPrivilege 2608 explorer.exe Token: SeChangeNotifyPrivilege 2608 explorer.exe Token: SeRemoteShutdownPrivilege 2608 explorer.exe Token: SeUndockPrivilege 2608 explorer.exe Token: SeSyncAgentPrivilege 2608 explorer.exe Token: SeEnableDelegationPrivilege 2608 explorer.exe Token: SeManageVolumePrivilege 2608 explorer.exe Token: SeImpersonatePrivilege 2608 explorer.exe Token: SeCreateGlobalPrivilege 2608 explorer.exe Token: 31 2608 explorer.exe Token: 32 2608 explorer.exe Token: 33 2608 explorer.exe Token: 34 2608 explorer.exe Token: 35 2608 explorer.exe Token: SeDebugPrivilege 2608 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 3004 wrote to memory of 2608 3004 0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe 89 PID 2608 wrote to memory of 3240 2608 explorer.exe 90 PID 2608 wrote to memory of 3240 2608 explorer.exe 90 PID 2608 wrote to memory of 3240 2608 explorer.exe 90 PID 2608 wrote to memory of 2636 2608 explorer.exe 91 PID 2608 wrote to memory of 2636 2608 explorer.exe 91 PID 2608 wrote to memory of 2636 2608 explorer.exe 91 PID 2608 wrote to memory of 3448 2608 explorer.exe 92 PID 2608 wrote to memory of 3448 2608 explorer.exe 92 PID 2608 wrote to memory of 3448 2608 explorer.exe 92 PID 2608 wrote to memory of 1336 2608 explorer.exe 94 PID 2608 wrote to memory of 1336 2608 explorer.exe 94 PID 2608 wrote to memory of 1336 2608 explorer.exe 94 PID 3240 wrote to memory of 1568 3240 cmd.exe 98 PID 3240 wrote to memory of 1568 3240 cmd.exe 98 PID 3240 wrote to memory of 1568 3240 cmd.exe 98 PID 2636 wrote to memory of 2444 2636 cmd.exe 99 PID 2636 wrote to memory of 2444 2636 cmd.exe 99 PID 2636 wrote to memory of 2444 2636 cmd.exe 99 PID 1336 wrote to memory of 5068 1336 cmd.exe 100 PID 1336 wrote to memory of 5068 1336 cmd.exe 100 PID 1336 wrote to memory of 5068 1336 cmd.exe 100 PID 3448 wrote to memory of 2160 3448 cmd.exe 101 PID 3448 wrote to memory of 2160 3448 cmd.exe 101 PID 3448 wrote to memory of 2160 3448 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ffad55d5e663fb3e79d4adee5536d59_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\explorer.exeC:\Users\Admin\AppData\Roaming\explorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\AQ2IPDSKWY.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AQ2IPDSKWY.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\AQ2IPDSKWY.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AQ2IPDSKWY.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5068
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1012,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5c1fb78d99ca3b69cf38f6db597cf30ae
SHA18ba8a5599ccb112b7dc0ccce6b2caed28f23148d
SHA256529ab958be3677b68119742eec0bb510e5d92af7fb0bb4a5df51bec230b8d19c
SHA51239fa63a5c6aceef48b0e1f930102b378cff44784fc3ddb4bc8aa66efdf6404ab69fb3b9beaee8da53bfa713113a4a767f0c86ba42bc719a37c41b9c6b2377ba6
-
Filesize
16KB
MD581c506ad733764272e1c11ec924656cd
SHA1e649822ccb552375b117b46fa4fbd176496dc1a5
SHA256a3ed0885f9944999838cfc6c93cfd4ded054b00c37bce3b283a26023fb965711
SHA512d3b3948d0ddd4d142482fe774a69d0c09f3389a40d0eded14a1140429e3548c6e134017885f1271dd671d5ade5c40ad80a70baa4f62dd198217683e2eccc5be0