Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe
-
Size
114KB
-
MD5
810132d096e4a90fffdcbec370fb4954
-
SHA1
43eb66678e036d09b18c0388331bc6e5c3815d22
-
SHA256
4d94cfc56febc282da0ed34cacc64284940e0c82c33843a93d7949b056106587
-
SHA512
25e1bd903ec9651fe233678c6de27c6d02621f89850e7742125be1f8f43fc0311d12df4177a52f9366bdfab2345f8cfbaa74caed4118bee45b3f5939e1ab7836
-
SSDEEP
1536:8EGqhhCwfeZO/ZBLwjinTIHA70tphBp9jZiBvElEp3GWtbpVeDrmIv0eY2Fy8z:3GqmzORYiTkA6TBHjZiVZ5pKzL/Y8z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\WINDÎWS\\åõðlîrår.exe" åõðlîrår.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 åõðlîrår.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power åõðlîrår.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys åõðlîrår.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\WINDÎWS\åõðlîrår.exe = "C:\\WINDÎWS\\åõðlîrår.exe" åõðlîrår.exe -
resource yara_rule behavioral2/memory/1060-2-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2604-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1060-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2604-13-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Program crash 4 IoCs
pid pid_target Process procid_target 2348 1060 WerFault.exe 85 1756 2604 WerFault.exe 91 4900 2604 WerFault.exe 91 1204 2604 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language åõðlîrår.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2516 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2604 1060 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 91 PID 1060 wrote to memory of 2604 1060 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 91 PID 1060 wrote to memory of 2604 1060 810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe 91 PID 2604 wrote to memory of 2516 2604 åõðlîrår.exe 94 PID 2604 wrote to memory of 2516 2604 åõðlîrår.exe 94 PID 2604 wrote to memory of 2516 2604 åõðlîrår.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\810132d096e4a90fffdcbec370fb4954_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\WINDÎWS\åõðlîrår.exeC:\WINDÎWS\åõðlîrår.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 7163⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 7203⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 7243⤵
- Program crash
PID:1204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 3762⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1060 -ip 10601⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2604 -ip 26041⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2604 -ip 26041⤵PID:3220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2604 -ip 26041⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5810132d096e4a90fffdcbec370fb4954
SHA143eb66678e036d09b18c0388331bc6e5c3815d22
SHA2564d94cfc56febc282da0ed34cacc64284940e0c82c33843a93d7949b056106587
SHA51225e1bd903ec9651fe233678c6de27c6d02621f89850e7742125be1f8f43fc0311d12df4177a52f9366bdfab2345f8cfbaa74caed4118bee45b3f5939e1ab7836