Analysis
-
max time kernel
127s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe
-
Size
107KB
-
MD5
15ebddbf6cab3a5cac811f63386c332c
-
SHA1
27999037329f4bbba7142467b144a2dd15281552
-
SHA256
e4b73c031756cfb952f2e8d9147ed4a565f117ffd453ecf60b4a8464bdaf86cb
-
SHA512
71281652d350b300d1341edb8d3c0236a0387d9bb97f483c3aea96a4a8dfa1858bbd2a90993422966d1fdc7e308bd8c22318c3617f441bbfc6b30e138465c6d6
-
SSDEEP
1536:7pqFQnVOw66Txr2Lx0cMl7ZQejq0QnqUyDDkgJYIkgX4/i+VwFuSsD:8QV71A0/l7y6KqXPk6Y9E49w8SsD
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\LINKINFO.DLL 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe File created C:\WINDOWS\SFDLL.DLL 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe File created C:\Windows\olinkinfo.dll 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe File opened for modification C:\Windows\olinkinfo.dll 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe Token: SeShutdownPrivilege 3004 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe 3004 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3004 2552 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe 28 PID 2552 wrote to memory of 3004 2552 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe 28 PID 2552 wrote to memory of 3004 2552 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe 28 PID 2552 wrote to memory of 3004 2552 15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15ebddbf6cab3a5cac811f63386c332c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3004
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD51387ce50932aa43e069f3dd078152853
SHA12842272cff673d0bbaedb7eaac64eec798b7a5d6
SHA25649b5ebdb5244ed62c0ea91822e8faedab799edd85e00aa5119354a6946f208cb
SHA51213985d501e75ed2b718c7f9ed3ecee239628495d1e8017c147c4447cb489da290526eca709acb8236a4991854ab41ecd62970077fc1f84926dbee3ae4995b698