Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
9f1f16de6755f29a852e3b955a9bc867
-
SHA1
5e5bf75f40b1777176ce36b0ce0ef6014eb6c8ef
-
SHA256
d563a31a5bea70ba4ac0cb6e52061d1ec18aa0dc30d1c1f3ce16b4377ce8ddc6
-
SHA512
933373b80525b3cdfc6fc8edaafdb7db9986812ebf44dd40c7d32ab6d8c8ed074df3e97fd933e7018e0e44a88f983705343825cc9a6c2a5ddae8cf04f1e89718
-
SSDEEP
98304:1bYLG01chcME9qGigwR8hcfMksQbzAfVrYe5vDCzd38moANZ1lv33:1OtoGhcEkszd5GJ33
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Project1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows = "C:\\Windows.exe" Project1.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 Project1.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Project1.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PEJCDDLEBBFOHHP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Project1.exe" 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Project1.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2384 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2384 vlc.exe Token: SeIncBasePriorityPrivilege 2384 vlc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe 2384 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 vlc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1984 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1984 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1984 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1984 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2384 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2384 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2384 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2384 2092 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Project1.exe"C:\Users\Admin\AppData\Local\Temp\Project1.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\saws.wav"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD56f55750feb16232ed4f3474cd3e0b860
SHA1940ba5ec15b545a2bde8de840ad699d97ec29525
SHA25649329976da56d2ecd8fa33dd086af1079e8a6267288cf9a2c0a261a82a8d8d9b
SHA5123599e2bb49fbb59bdd8c225cd2909df1f8b979573470d358ab250ef5398334c7bda4de670421b02fbb4518889c183d66c0c22127dd95cd75c3e64cd019309877
-
Filesize
5.5MB
MD5058bd7ce50e8da302bfd70b9086acee6
SHA1bac29a7529adfb06b09c8a79ebfeb78dc4a1fbef
SHA25649ea0d84b47bef0d038b626187e0b7195ee320caea8ca10e7145487f4bece001
SHA5128f878711be523c2f13e470117e0041a7e18d02bcfa98d3a29875e12dfb845acbcc8344d25474fcf155a2ad661897256780c5f2084e817fc0d1fc3fb3f94eee64