Analysis Overview
SHA256
de6e459bcb96ae5f363d05d9a0dde6c73b1a41d11fd60a4a7a26ce58475bce5f
Threat Level: Shows suspicious behavior
The file 4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Writes to the Master Boot Record (MBR)
Suspicious use of SetThreadContext
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Modifies Control Panel
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-10-16 23:14
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-16 23:14
Reported
2024-10-16 23:17
Platform
win7-20240903-en
Max time kernel
141s
Max time network
123s
Command Line
Signatures
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2584 set thread context of 2884 | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Modifies Control Panel
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Locale = "00000409" | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Locales = "00000409" | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
Network
Files
memory/2884-65-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-69-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-73-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-80-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-84-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-86-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-89-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-88-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-85-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-335-0x0000000000240000-0x000000000026D000-memory.dmp
memory/2884-336-0x0000000000240000-0x000000000026D000-memory.dmp
memory/2884-341-0x0000000000240000-0x000000000028D000-memory.dmp
memory/2884-342-0x0000000000240000-0x000000000028D000-memory.dmp
memory/2884-346-0x0000000000240000-0x0000000000264000-memory.dmp
memory/2884-353-0x00000000029C0000-0x0000000002A66000-memory.dmp
memory/2884-352-0x0000000000400000-0x0000000000436000-memory.dmp
memory/2884-354-0x00000000029C0000-0x0000000002A66000-memory.dmp
memory/2884-359-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-360-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-367-0x0000000000240000-0x000000000026D000-memory.dmp
memory/2884-372-0x0000000000240000-0x0000000000252000-memory.dmp
memory/2884-370-0x0000000000240000-0x000000000028D000-memory.dmp
memory/2884-369-0x0000000000240000-0x0000000000271000-memory.dmp
memory/2884-368-0x0000000000240000-0x0000000000271000-memory.dmp
memory/2884-375-0x0000000000240000-0x0000000000252000-memory.dmp
memory/2884-374-0x0000000000240000-0x000000000028D000-memory.dmp
memory/2884-380-0x0000000000240000-0x0000000000264000-memory.dmp
memory/2884-382-0x0000000002710000-0x000000000277B000-memory.dmp
memory/2884-381-0x0000000002710000-0x000000000277B000-memory.dmp
memory/2884-387-0x00000000029C0000-0x0000000002A59000-memory.dmp
memory/2884-388-0x00000000029C0000-0x0000000002A66000-memory.dmp
memory/2884-389-0x00000000029C0000-0x0000000002A59000-memory.dmp
memory/2884-394-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-395-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-396-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-402-0x0000000000240000-0x0000000000271000-memory.dmp
memory/2884-403-0x0000000000240000-0x0000000000271000-memory.dmp
memory/2884-404-0x00000000029C0000-0x0000000002A31000-memory.dmp
memory/2884-405-0x00000000029C0000-0x0000000002A31000-memory.dmp
memory/2884-410-0x0000000000240000-0x0000000000248000-memory.dmp
memory/2884-411-0x0000000000240000-0x0000000000252000-memory.dmp
memory/2884-412-0x0000000002710000-0x000000000277B000-memory.dmp
memory/2884-413-0x0000000002710000-0x000000000277B000-memory.dmp
memory/2884-414-0x00000000029C0000-0x0000000002A59000-memory.dmp
memory/2884-415-0x00000000029C0000-0x0000000002A59000-memory.dmp
memory/2884-417-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-416-0x0000000000240000-0x000000000024B000-memory.dmp
memory/2884-419-0x00000000029C0000-0x0000000002A31000-memory.dmp
memory/2884-418-0x00000000029C0000-0x0000000002A31000-memory.dmp
memory/2884-421-0x0000000000240000-0x0000000000248000-memory.dmp
memory/2884-420-0x0000000000400000-0x0000000000436000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-16 23:14
Reported
2024-10-16 23:17
Platform
win10v2004-20241007-en
Max time kernel
140s
Max time network
145s
Command Line
Signatures
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3804 set thread context of 4340 | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Modifies Control Panel
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Locale = "00000409" | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Locales = "00000409" | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
C:\Users\Admin\AppData\Local\Temp\4f8bd983e34ffb5e76576d18cbd6e9e0_JaffaCakes118.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 5.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
Files
memory/4340-187-0x0000000000400000-0x0000000000436000-memory.dmp
memory/4340-190-0x0000000000400000-0x0000000000436000-memory.dmp
memory/4340-194-0x0000000000400000-0x0000000000436000-memory.dmp
memory/4340-193-0x0000000000400000-0x0000000000436000-memory.dmp
memory/4340-191-0x0000000000400000-0x0000000000436000-memory.dmp
memory/4340-507-0x0000000000400000-0x0000000000436000-memory.dmp