Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe
-
Size
773KB
-
MD5
505e0479271963403c89d94dc8d9297e
-
SHA1
0281b7e8b7bae68774a97569bcb3ba747d3c7f8e
-
SHA256
f44dad3c2f770d7ffd8234e857184d196d2251e28375c6f8e5bb499dd8fffe1b
-
SHA512
e0687467efd8924e665d4d63b478054b441cd40d2e206f9ecdd16d518bfd24d3c885e54554c856369704eac9c12ce2c08340b6fdbe2945db734a87f4c64abc2c
-
SSDEEP
12288:wYU38tWvCBtmerOuCvLmWzZsSeOqbEwFsxikVPdJV717Uji4NHv4UHolx7cjOnqH:vRrOuOmW9snobHVPdc/x4UIlgOnq8acg
Malware Config
Signatures
-
Disables RegEdit via registry modification 2 IoCs
Processes:
Crypted.exeexplorer.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Crypted.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Crypted.exeexplorer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
Crypted.exepid Process 2540 Crypted.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Crypted.exedescription pid Process procid_target PID 2540 set thread context of 452 2540 Crypted.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Crypted.exeexplorer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exeCrypted.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Crypted.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Crypted.exeexplorer.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid Process 452 explorer.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
Crypted.exeexplorer.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2540 Crypted.exe Token: SeSecurityPrivilege 2540 Crypted.exe Token: SeTakeOwnershipPrivilege 2540 Crypted.exe Token: SeLoadDriverPrivilege 2540 Crypted.exe Token: SeSystemProfilePrivilege 2540 Crypted.exe Token: SeSystemtimePrivilege 2540 Crypted.exe Token: SeProfSingleProcessPrivilege 2540 Crypted.exe Token: SeIncBasePriorityPrivilege 2540 Crypted.exe Token: SeCreatePagefilePrivilege 2540 Crypted.exe Token: SeBackupPrivilege 2540 Crypted.exe Token: SeRestorePrivilege 2540 Crypted.exe Token: SeShutdownPrivilege 2540 Crypted.exe Token: SeDebugPrivilege 2540 Crypted.exe Token: SeSystemEnvironmentPrivilege 2540 Crypted.exe Token: SeChangeNotifyPrivilege 2540 Crypted.exe Token: SeRemoteShutdownPrivilege 2540 Crypted.exe Token: SeUndockPrivilege 2540 Crypted.exe Token: SeManageVolumePrivilege 2540 Crypted.exe Token: SeImpersonatePrivilege 2540 Crypted.exe Token: SeCreateGlobalPrivilege 2540 Crypted.exe Token: 33 2540 Crypted.exe Token: 34 2540 Crypted.exe Token: 35 2540 Crypted.exe Token: 36 2540 Crypted.exe Token: SeIncreaseQuotaPrivilege 452 explorer.exe Token: SeSecurityPrivilege 452 explorer.exe Token: SeTakeOwnershipPrivilege 452 explorer.exe Token: SeLoadDriverPrivilege 452 explorer.exe Token: SeSystemProfilePrivilege 452 explorer.exe Token: SeSystemtimePrivilege 452 explorer.exe Token: SeProfSingleProcessPrivilege 452 explorer.exe Token: SeIncBasePriorityPrivilege 452 explorer.exe Token: SeCreatePagefilePrivilege 452 explorer.exe Token: SeBackupPrivilege 452 explorer.exe Token: SeRestorePrivilege 452 explorer.exe Token: SeShutdownPrivilege 452 explorer.exe Token: SeDebugPrivilege 452 explorer.exe Token: SeSystemEnvironmentPrivilege 452 explorer.exe Token: SeChangeNotifyPrivilege 452 explorer.exe Token: SeRemoteShutdownPrivilege 452 explorer.exe Token: SeUndockPrivilege 452 explorer.exe Token: SeManageVolumePrivilege 452 explorer.exe Token: SeImpersonatePrivilege 452 explorer.exe Token: SeCreateGlobalPrivilege 452 explorer.exe Token: 33 452 explorer.exe Token: 34 452 explorer.exe Token: 35 452 explorer.exe Token: 36 452 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
505e0479271963403c89d94dc8d9297e_JaffaCakes118.exeCrypted.exedescription pid Process procid_target PID 2896 wrote to memory of 2540 2896 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 86 PID 2896 wrote to memory of 2540 2896 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 86 PID 2896 wrote to memory of 2540 2896 505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe 86 PID 2540 wrote to memory of 452 2540 Crypted.exe 93 PID 2540 wrote to memory of 452 2540 Crypted.exe 93 PID 2540 wrote to memory of 452 2540 Crypted.exe 93 PID 2540 wrote to memory of 452 2540 Crypted.exe 93 PID 2540 wrote to memory of 452 2540 Crypted.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\505e0479271963403c89d94dc8d9297e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5d06bab06b90d6834fa3ca20f7721bce3
SHA1aabe13f7b43fa5a864dbeda293eddb080ab0dc3e
SHA25654be714f25b54574940c8f1f561fba8f99d54e43f944bc642a3c276c42dade03
SHA51212d21ecb86b839b8d606c0143a03bed8789b5fb3addc5e55f9956edfe64d0fb3dc4469fdbd957fa37ea1d4e9fe5ede7c6f4241e8eeb2fffb95aacd88a5984703