Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe
-
Size
72KB
-
MD5
11fc4ed7f48d160cb6b31bd024368a62
-
SHA1
8b974d765f65fc8cc5d1d3e3d825c7c7eb71e177
-
SHA256
cd4438b64175fd5321b7782f890e199c94d96f3626a60b2c37e5a45a1773886d
-
SHA512
002dd7773fc37ec9026caeae929fc7feb3d715fa7a684e202ef2694d45da25872a1afb5d2bde7b61cf19177808b62f871056ca9aa03afe4771744822613ddade
-
SSDEEP
768:rJHiEaq8TU2F99G218OrzlgTScp1U1vhBqgAUAas4hefyT2t6VtM:r9iqIFLn+TDPU1ZoTwey1Vt
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2364 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\del.bat 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fxsst.dll 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe File opened for modification C:\Windows\fxsst.dll 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe Token: SeShutdownPrivilege 2900 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe 2900 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2364 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2364 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2364 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2364 2252 11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\system32\del.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD5a10a86b9aa57cd2b8460bedf1720a6a5
SHA10af316fe2525b0d6963fa41ac04a3f04a79950b5
SHA2569af8f854dc3baa724049541d7f60fb306e7c6900f413701b8fd57b5a70c554b4
SHA5127c231fca80e528f05c1a69937e06c135b3a981363ed2163e71fd19ce33e702ec20d9214f39979125ad7f3ed60ef14aeb81af7ceb8ea3621ef01407020eef14e3
-
Filesize
52KB
MD5bf8a036a69643a6e00085544ef187d0a
SHA1006b5e8030acda0fba9888c7c5159cff5531a532
SHA256190ac50664d03ef2e5398767aad3f8e85d1a9f63947702b59ebf14669d0bd214
SHA51249aa0e9c711b03f8e17a8e7e8f0ba7e20bd00d47be503ee99fc6bf5bfe4529be2ddbea2707dadcd1b81244e8966e8a34c8b0dc32a8d6d278e34011fc930dc0bd