Analysis
-
max time kernel
124s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 01:31
Behavioral task
behavioral1
Sample
287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe
-
Size
180KB
-
MD5
287c63c5d1638cfef2ff3879c0d7b2af
-
SHA1
01b6f6cdcbf76d3aa37c01a232d41f5ecd9134eb
-
SHA256
4abf28e971cdc4049abebe0675a8ffd77c601cd12c538d6bc87b56c933e2b85e
-
SHA512
c3311a359594ca2184c94f4b2e9ad066283a783e721d150411060719410d6b05fd463163908efd25a45a7448e20127b0f9d5cbd96616e24fd64a8af718e0ea91
-
SSDEEP
3072:M04mK82ZuSo7Q/pxrdkfSDJK9FEL6ZomOmDQpOW/UkL81juZQTZeDYA7yqFA:MpZudQXmfSDaFOnhskwuuTZ2YAVFA
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\M: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\P: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\R: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\U: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\V: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\X: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\H: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\N: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\Q: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\I: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\L: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\O: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\Y: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\E: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\G: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\K: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\S: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\T: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\W: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened (read-only) \??\Z: 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\msiexec.vir 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\searchindexer.vir 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\dllhost.vir 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\svchost.vir 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2444-0-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2444-80-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{CE8BEB32-430C-4891-8D17-3B601776DF30}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{CE8BEB32-430C-4891-8D17-3B601776DF30}.crmlog dllhost.exe File opened for modification \??\c:\windows\ehome\ehsched.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap SearchIndexer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2444 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe Token: SeRestorePrivilege 1932 msiexec.exe Token: SeTakeOwnershipPrivilege 1932 msiexec.exe Token: SeSecurityPrivilege 1932 msiexec.exe Token: SeManageVolumePrivilege 2004 SearchIndexer.exe Token: 33 2004 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2004 SearchIndexer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2444 287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe 2592 SearchProtocolHost.exe 2592 SearchProtocolHost.exe 2592 SearchProtocolHost.exe 2592 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2592 2004 SearchIndexer.exe 31 PID 2004 wrote to memory of 2592 2004 SearchIndexer.exe 31 PID 2004 wrote to memory of 2592 2004 SearchIndexer.exe 31 PID 2004 wrote to memory of 2488 2004 SearchIndexer.exe 32 PID 2004 wrote to memory of 2488 2004 SearchIndexer.exe 32 PID 2004 wrote to memory of 2488 2004 SearchIndexer.exe 32 PID 2004 wrote to memory of 1492 2004 SearchIndexer.exe 35 PID 2004 wrote to memory of 1492 2004 SearchIndexer.exe 35 PID 2004 wrote to memory of 1492 2004 SearchIndexer.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\287c63c5d1638cfef2ff3879c0d7b2af_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2444
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:2412
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 5162⤵PID:2488
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 5162⤵PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5e0707a7fc169d2dafee527a575942dd4
SHA19934b6f171208092a010f8b5437a9023a50a489e
SHA2561dad898b201bbca3ba2484872447d1e184522c88178e4da6d9a374920980fb20
SHA5127c863def97ce71dd123070a2d0b63e9787c0e5671f552eced86fac5fdbb082adbf895d94e88b731e48f9ff2de8d7f03a7ade02113e84577eb50c1a638508b23a