Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe
-
Size
686KB
-
MD5
74780ce2d7cca50a2e02d895f16b7646
-
SHA1
a1ac8a1ad30801415c85e92522009acfbbecc647
-
SHA256
4a683c5439a91cd97ba2a68258528f2aa4e640a650219b2ccd3e30468062cc83
-
SHA512
958d5447306cb0b51ecd2a70d954ba12a440bc834284783301d95b1a98474c93f4cf8cbcca52819ddb5907d174ae56685cfd6d402e5f8239fa6995a003ad8dbf
-
SSDEEP
12288:A0yjePRkouFP8gpfJOZ9autdjvP/OlYYONpNqEayhK:hyCbutx0zau/gZOJa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation PerfWatsonPackage.exe -
Executes dropped EXE 2 IoCs
pid Process 3752 PerfWatsonPackage.exe 2676 msvbprj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\© Windows Live Messenger Music Status Plugin Module = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PerfWatsonPackage.exe" PerfWatsonPackage.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 672 set thread context of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 2676 set thread context of 2152 2676 msvbprj.exe 89 -
resource yara_rule behavioral2/memory/1388-7-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-8-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-9-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-10-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-11-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-15-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-14-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-13-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PerfWatsonPackage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvbprj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 3752 PerfWatsonPackage.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 2676 msvbprj.exe 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1388 AppLaunch.exe Token: SeSecurityPrivilege 1388 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1388 AppLaunch.exe Token: SeLoadDriverPrivilege 1388 AppLaunch.exe Token: SeSystemProfilePrivilege 1388 AppLaunch.exe Token: SeSystemtimePrivilege 1388 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1388 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1388 AppLaunch.exe Token: SeCreatePagefilePrivilege 1388 AppLaunch.exe Token: SeBackupPrivilege 1388 AppLaunch.exe Token: SeRestorePrivilege 1388 AppLaunch.exe Token: SeShutdownPrivilege 1388 AppLaunch.exe Token: SeDebugPrivilege 1388 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1388 AppLaunch.exe Token: SeChangeNotifyPrivilege 1388 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1388 AppLaunch.exe Token: SeUndockPrivilege 1388 AppLaunch.exe Token: SeManageVolumePrivilege 1388 AppLaunch.exe Token: SeImpersonatePrivilege 1388 AppLaunch.exe Token: SeCreateGlobalPrivilege 1388 AppLaunch.exe Token: 33 1388 AppLaunch.exe Token: 34 1388 AppLaunch.exe Token: 35 1388 AppLaunch.exe Token: 36 1388 AppLaunch.exe Token: SeDebugPrivilege 3752 PerfWatsonPackage.exe Token: SeDebugPrivilege 2676 msvbprj.exe Token: SeIncreaseQuotaPrivilege 2152 AppLaunch.exe Token: SeSecurityPrivilege 2152 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2152 AppLaunch.exe Token: SeLoadDriverPrivilege 2152 AppLaunch.exe Token: SeSystemProfilePrivilege 2152 AppLaunch.exe Token: SeSystemtimePrivilege 2152 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2152 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2152 AppLaunch.exe Token: SeCreatePagefilePrivilege 2152 AppLaunch.exe Token: SeBackupPrivilege 2152 AppLaunch.exe Token: SeRestorePrivilege 2152 AppLaunch.exe Token: SeShutdownPrivilege 2152 AppLaunch.exe Token: SeDebugPrivilege 2152 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2152 AppLaunch.exe Token: SeChangeNotifyPrivilege 2152 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2152 AppLaunch.exe Token: SeUndockPrivilege 2152 AppLaunch.exe Token: SeManageVolumePrivilege 2152 AppLaunch.exe Token: SeImpersonatePrivilege 2152 AppLaunch.exe Token: SeCreateGlobalPrivilege 2152 AppLaunch.exe Token: 33 2152 AppLaunch.exe Token: 34 2152 AppLaunch.exe Token: 35 2152 AppLaunch.exe Token: 36 2152 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1388 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 1388 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 85 PID 672 wrote to memory of 3752 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 87 PID 672 wrote to memory of 3752 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 87 PID 672 wrote to memory of 3752 672 74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe 87 PID 3752 wrote to memory of 2676 3752 PerfWatsonPackage.exe 88 PID 3752 wrote to memory of 2676 3752 PerfWatsonPackage.exe 88 PID 3752 wrote to memory of 2676 3752 PerfWatsonPackage.exe 88 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89 PID 2676 wrote to memory of 2152 2676 msvbprj.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74780ce2d7cca50a2e02d895f16b7646_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\PerfWatsonPackage.exe"C:\Users\Admin\AppData\Local\Temp\PerfWatsonPackage.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\msvbprj.exe"C:\Users\Admin\AppData\Local\Temp\msvbprj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55de5595461e7d2128487452a00021d0b
SHA1475ac303168d7165ba5d51df5b46e5e6169d03fc
SHA2562cf9865737b18d9bde9e44c59a039655dca28706f55097a149361e6b6bf54259
SHA512799ed7527dedce3e602751032b68d21f619daa45c39d608f07973e9ce316dde947ed716c7f119989f2d7d793a6b14ae05b4f103d49d2b80fe8acd67faac509ca
-
Filesize
686KB
MD574780ce2d7cca50a2e02d895f16b7646
SHA1a1ac8a1ad30801415c85e92522009acfbbecc647
SHA2564a683c5439a91cd97ba2a68258528f2aa4e640a650219b2ccd3e30468062cc83
SHA512958d5447306cb0b51ecd2a70d954ba12a440bc834284783301d95b1a98474c93f4cf8cbcca52819ddb5907d174ae56685cfd6d402e5f8239fa6995a003ad8dbf