Analysis
-
max time kernel
9s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe
-
Size
90KB
-
MD5
54e0b0172b252617b3fb96f6e899eff3
-
SHA1
b46e5c4f484fb43d47de75a5b2fd26558335d3c7
-
SHA256
b48326823cad0a141724e6c6d8a8d0a1f3fd5195a1aed03354a2ccadaf873c38
-
SHA512
b5d3c85b702b50ecf61947c76cd3665654a7cd81ee203b9bc3c0aaaa52c738562c0d74542f54fb7497155fb5245cdc14063ebc9e46d6146edc33b4ce67e5044f
-
SSDEEP
1536:hgYPhQXwIiPrrjThO+lUBrzCxry1ec7rUyj239auh53RdXFwW:KYP2XerzhOUxu/XUtauzDFwW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "59" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2960 shutdown.exe Token: SeRemoteShutdownPrivilege 2960 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3008 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4812 wrote to memory of 632 4812 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 84 PID 4812 wrote to memory of 632 4812 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 84 PID 4812 wrote to memory of 632 4812 54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe 84 PID 632 wrote to memory of 1372 632 cmd.exe 86 PID 632 wrote to memory of 1372 632 cmd.exe 86 PID 632 wrote to memory of 1372 632 cmd.exe 86 PID 632 wrote to memory of 2960 632 cmd.exe 87 PID 632 wrote to memory of 2960 632 cmd.exe 87 PID 632 wrote to memory of 2960 632 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54e0b0172b252617b3fb96f6e899eff3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Windows\system32\hal.dll /f /q3⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 05 -c "Good bye, my love, good bye"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38ca855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD506c5ae8cc629f30b31b0384f5d2d979a
SHA1d3742c22ef6687907d9ef91cb69ebe337130bef7
SHA2560ea0719b9de4b8876d7f7128a3133f4eaed3dddeaa8a2b702d0285fa5d1a6e4a
SHA512f55ab1c047aee51a38b0da0d844f07b5cb633d1ad3ecfb035fa956c94b0c2732a59e8236e53ddacef9286795b37074f20e6283bba40bcf29dbf98baf8b799975