Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
9f1f16de6755f29a852e3b955a9bc867
-
SHA1
5e5bf75f40b1777176ce36b0ce0ef6014eb6c8ef
-
SHA256
d563a31a5bea70ba4ac0cb6e52061d1ec18aa0dc30d1c1f3ce16b4377ce8ddc6
-
SHA512
933373b80525b3cdfc6fc8edaafdb7db9986812ebf44dd40c7d32ab6d8c8ed074df3e97fd933e7018e0e44a88f983705343825cc9a6c2a5ddae8cf04f1e89718
-
SSDEEP
98304:1bYLG01chcME9qGigwR8hcfMksQbzAfVrYe5vDCzd38moANZ1lv33:1OtoGhcEkszd5GJ33
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
Project1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Project1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows = "C:\\Windows.exe" Project1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
Project1.exepid process 3876 Project1.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
Processes:
Project1.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Project1.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Project1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JOHHPEBBFKICDIK = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Project1.exe" 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exeProject1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Project1.exe -
Modifies registry class 1 IoCs
Processes:
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 744 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 744 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEvlc.exedescription pid process Token: 33 3152 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3152 AUDIODG.EXE Token: 33 744 vlc.exe Token: SeIncBasePriorityPrivilege 744 vlc.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
vlc.exepid process 744 vlc.exe 744 vlc.exe 744 vlc.exe 744 vlc.exe 744 vlc.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
vlc.exepid process 744 vlc.exe 744 vlc.exe 744 vlc.exe 744 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 744 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exedescription pid process target process PID 2224 wrote to memory of 3876 2224 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe Project1.exe PID 2224 wrote to memory of 3876 2224 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe Project1.exe PID 2224 wrote to memory of 3876 2224 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe Project1.exe PID 2224 wrote to memory of 744 2224 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe vlc.exe PID 2224 wrote to memory of 744 2224 9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f1f16de6755f29a852e3b955a9bc867_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Project1.exe"C:\Users\Admin\AppData\Local\Temp\Project1.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- System Location Discovery: System Language Discovery
PID:3876
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\saws.wav"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:744
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e0 0x2f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD56f55750feb16232ed4f3474cd3e0b860
SHA1940ba5ec15b545a2bde8de840ad699d97ec29525
SHA25649329976da56d2ecd8fa33dd086af1079e8a6267288cf9a2c0a261a82a8d8d9b
SHA5123599e2bb49fbb59bdd8c225cd2909df1f8b979573470d358ab250ef5398334c7bda4de670421b02fbb4518889c183d66c0c22127dd95cd75c3e64cd019309877
-
Filesize
5.5MB
MD5058bd7ce50e8da302bfd70b9086acee6
SHA1bac29a7529adfb06b09c8a79ebfeb78dc4a1fbef
SHA25649ea0d84b47bef0d038b626187e0b7195ee320caea8ca10e7145487f4bece001
SHA5128f878711be523c2f13e470117e0041a7e18d02bcfa98d3a29875e12dfb845acbcc8344d25474fcf155a2ad661897256780c5f2084e817fc0d1fc3fb3f94eee64