Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe
-
Size
734KB
-
MD5
363ccdf350127f4e09240812b7f8a4aa
-
SHA1
c8f6ba9604fefb453e16bf3a696c306c3c420f2d
-
SHA256
95554e8e6edc65860feed3b2976ac5e6d6e71ef28034449df8e536e775f10ca5
-
SHA512
643dfd3f1af1936980c4595ea11ceae5eba2bb4ab604c504aead7b446b03b6203f99f05df1f999980120247008db91cbc3194dfdd31e2a669db6b2e1fc44e2b1
-
SSDEEP
12288:JaXTluCLVHtas59KjOGquDN6cDrdUdSZbcrqSeV5J9otAEPL:4XxbJN39KaGt9DxU0ZbcWj9oiA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ntvdmd.exe -
Deletes itself 1 IoCs
pid Process 1436 explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1436 explorer.exe 2932 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\© Microsoft Real Time Media Stack = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\ntvdmd.exe" ntvdmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1436 set thread context of 2932 1436 explorer.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntvdmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UccApi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe 2524 ntvdmd.exe 1856 UccApi.exe 1436 explorer.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 4068 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe Token: SeDebugPrivilege 1436 explorer.exe Token: SeIncreaseQuotaPrivilege 2932 explorer.exe Token: SeSecurityPrivilege 2932 explorer.exe Token: SeTakeOwnershipPrivilege 2932 explorer.exe Token: SeLoadDriverPrivilege 2932 explorer.exe Token: SeSystemProfilePrivilege 2932 explorer.exe Token: SeSystemtimePrivilege 2932 explorer.exe Token: SeProfSingleProcessPrivilege 2932 explorer.exe Token: SeIncBasePriorityPrivilege 2932 explorer.exe Token: SeCreatePagefilePrivilege 2932 explorer.exe Token: SeBackupPrivilege 2932 explorer.exe Token: SeRestorePrivilege 2932 explorer.exe Token: SeShutdownPrivilege 2932 explorer.exe Token: SeDebugPrivilege 2932 explorer.exe Token: SeSystemEnvironmentPrivilege 2932 explorer.exe Token: SeChangeNotifyPrivilege 2932 explorer.exe Token: SeRemoteShutdownPrivilege 2932 explorer.exe Token: SeUndockPrivilege 2932 explorer.exe Token: SeManageVolumePrivilege 2932 explorer.exe Token: SeImpersonatePrivilege 2932 explorer.exe Token: SeCreateGlobalPrivilege 2932 explorer.exe Token: 33 2932 explorer.exe Token: 34 2932 explorer.exe Token: 35 2932 explorer.exe Token: 36 2932 explorer.exe Token: SeDebugPrivilege 2524 ntvdmd.exe Token: SeDebugPrivilege 1856 UccApi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2932 explorer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1436 4068 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe 86 PID 4068 wrote to memory of 1436 4068 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe 86 PID 4068 wrote to memory of 1436 4068 363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe 86 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2932 1436 explorer.exe 87 PID 1436 wrote to memory of 2524 1436 explorer.exe 88 PID 1436 wrote to memory of 2524 1436 explorer.exe 88 PID 1436 wrote to memory of 2524 1436 explorer.exe 88 PID 2524 wrote to memory of 1856 2524 ntvdmd.exe 89 PID 2524 wrote to memory of 1856 2524 ntvdmd.exe 89 PID 2524 wrote to memory of 1856 2524 ntvdmd.exe 89 PID 1856 wrote to memory of 3436 1856 UccApi.exe 90 PID 1856 wrote to memory of 3436 1856 UccApi.exe 90 PID 1856 wrote to memory of 3436 1856 UccApi.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\363ccdf350127f4e09240812b7f8a4aa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\System\ntvdmd.exe"C:\Users\Admin\AppData\Local\Temp\System\ntvdmd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\System\UccApi.exe"C:\Users\Admin\AppData\Local\Temp\System\UccApi.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\System\UccApi.exeC:\Users\Admin\AppData\Local\Temp\System\UccApi.exe5⤵PID:3436
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5e7bd582f7edd2dded3c46333d4275b1b
SHA17a4c047e681369daf5fb69025b9188395d1919c2
SHA256a97342051711cec6738b0463308532d034daa23a93988c97d057d9e2ada73937
SHA512073474901d54516dcd37beab669f9756632166e7501131f482883cd32f1a1a758443b1c6fbb5dce11a65e1188d5947a5fcb2b4f9e082a81c3067c666beccdd4a
-
Filesize
47KB
MD503c886af821f78c72b9f31a5ee9523bf
SHA100eb6757b298c1dbfd815672c4d66d88078f489f
SHA256225e869ca14f2ce166871f218c9ff7161ebd25b8ea521a563194d40729318247
SHA512d6d915b160019545ad77f62bf8aa25945fb142c105c2a0535c34139f83f2874412706d6be2e6d982a0a8f54caba2e4debf4446ede134c6c766510dbe942377f0
-
Filesize
734KB
MD5363ccdf350127f4e09240812b7f8a4aa
SHA1c8f6ba9604fefb453e16bf3a696c306c3c420f2d
SHA25695554e8e6edc65860feed3b2976ac5e6d6e71ef28034449df8e536e775f10ca5
SHA512643dfd3f1af1936980c4595ea11ceae5eba2bb4ab604c504aead7b446b03b6203f99f05df1f999980120247008db91cbc3194dfdd31e2a669db6b2e1fc44e2b1