Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe
-
Size
773KB
-
MD5
505e0479271963403c89d94dc8d9297e
-
SHA1
0281b7e8b7bae68774a97569bcb3ba747d3c7f8e
-
SHA256
f44dad3c2f770d7ffd8234e857184d196d2251e28375c6f8e5bb499dd8fffe1b
-
SHA512
e0687467efd8924e665d4d63b478054b441cd40d2e206f9ecdd16d518bfd24d3c885e54554c856369704eac9c12ce2c08340b6fdbe2945db734a87f4c64abc2c
-
SSDEEP
12288:wYU38tWvCBtmerOuCvLmWzZsSeOqbEwFsxikVPdJV717Uji4NHv4UHolx7cjOnqH:vRrOuOmW9snobHVPdc/x4UIlgOnq8acg
Malware Config
Signatures
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Crypted.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 Crypted.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2920 set thread context of 2676 2920 Crypted.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Crypted.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Crypted.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 explorer.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2920 Crypted.exe Token: SeSecurityPrivilege 2920 Crypted.exe Token: SeTakeOwnershipPrivilege 2920 Crypted.exe Token: SeLoadDriverPrivilege 2920 Crypted.exe Token: SeSystemProfilePrivilege 2920 Crypted.exe Token: SeSystemtimePrivilege 2920 Crypted.exe Token: SeProfSingleProcessPrivilege 2920 Crypted.exe Token: SeIncBasePriorityPrivilege 2920 Crypted.exe Token: SeCreatePagefilePrivilege 2920 Crypted.exe Token: SeBackupPrivilege 2920 Crypted.exe Token: SeRestorePrivilege 2920 Crypted.exe Token: SeShutdownPrivilege 2920 Crypted.exe Token: SeDebugPrivilege 2920 Crypted.exe Token: SeSystemEnvironmentPrivilege 2920 Crypted.exe Token: SeChangeNotifyPrivilege 2920 Crypted.exe Token: SeRemoteShutdownPrivilege 2920 Crypted.exe Token: SeUndockPrivilege 2920 Crypted.exe Token: SeManageVolumePrivilege 2920 Crypted.exe Token: SeImpersonatePrivilege 2920 Crypted.exe Token: SeCreateGlobalPrivilege 2920 Crypted.exe Token: 33 2920 Crypted.exe Token: 34 2920 Crypted.exe Token: 35 2920 Crypted.exe Token: SeIncreaseQuotaPrivilege 2676 explorer.exe Token: SeSecurityPrivilege 2676 explorer.exe Token: SeTakeOwnershipPrivilege 2676 explorer.exe Token: SeLoadDriverPrivilege 2676 explorer.exe Token: SeSystemProfilePrivilege 2676 explorer.exe Token: SeSystemtimePrivilege 2676 explorer.exe Token: SeProfSingleProcessPrivilege 2676 explorer.exe Token: SeIncBasePriorityPrivilege 2676 explorer.exe Token: SeCreatePagefilePrivilege 2676 explorer.exe Token: SeBackupPrivilege 2676 explorer.exe Token: SeRestorePrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeDebugPrivilege 2676 explorer.exe Token: SeSystemEnvironmentPrivilege 2676 explorer.exe Token: SeChangeNotifyPrivilege 2676 explorer.exe Token: SeRemoteShutdownPrivilege 2676 explorer.exe Token: SeUndockPrivilege 2676 explorer.exe Token: SeManageVolumePrivilege 2676 explorer.exe Token: SeImpersonatePrivilege 2676 explorer.exe Token: SeCreateGlobalPrivilege 2676 explorer.exe Token: 33 2676 explorer.exe Token: 34 2676 explorer.exe Token: 35 2676 explorer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2920 2664 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2920 2664 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2920 2664 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2920 2664 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 31 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32 PID 2920 wrote to memory of 2676 2920 Crypted.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5d06bab06b90d6834fa3ca20f7721bce3
SHA1aabe13f7b43fa5a864dbeda293eddb080ab0dc3e
SHA25654be714f25b54574940c8f1f561fba8f99d54e43f944bc642a3c276c42dade03
SHA51212d21ecb86b839b8d606c0143a03bed8789b5fb3addc5e55f9956edfe64d0fb3dc4469fdbd957fa37ea1d4e9fe5ede7c6f4241e8eeb2fffb95aacd88a5984703