Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe
-
Size
88KB
-
MD5
b4dd126a8a85297f6695d1e89f8a827b
-
SHA1
888390b12724c4f7de484029b081cc5cd78d239d
-
SHA256
e055346bbcea8acc879fc9ab7cc231658971d42f463c1a4a139a139fbbb95ac7
-
SHA512
0c0c5899ff61b487469dad1a4348ef2ec7f8e04c6a21509c4165dd7f8864ead17360b9198c79c602123c5e3d31dfb7cc14bafa4245421be0c171aaf6d4791572
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEP:6D0ctAVA/bmxIMnoKjyR/NP
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/1408-62-0x0000000001100000-0x0000000001105000-memory.dmp family_andromeda behavioral2/memory/1408-66-0x0000000001100000-0x0000000001105000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\52278 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msejahd.bat" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 556 winlogonr.exe 1616 winlogonr.exe 4228 winlogonr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum winlogonr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4516 set thread context of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 556 set thread context of 1616 556 winlogonr.exe 105 PID 556 set thread context of 4228 556 winlogonr.exe 106 -
resource yara_rule behavioral2/memory/2328-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2328-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2328-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2328-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2328-54-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1616-68-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msejahd.bat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4228 winlogonr.exe 4228 winlogonr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4228 winlogonr.exe 4228 winlogonr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe Token: SeDebugPrivilege 1616 winlogonr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 556 winlogonr.exe 1616 winlogonr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 4516 wrote to memory of 2328 4516 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 89 PID 2328 wrote to memory of 2208 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 92 PID 2328 wrote to memory of 2208 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 92 PID 2328 wrote to memory of 2208 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 92 PID 2208 wrote to memory of 1696 2208 cmd.exe 96 PID 2208 wrote to memory of 1696 2208 cmd.exe 96 PID 2208 wrote to memory of 1696 2208 cmd.exe 96 PID 2328 wrote to memory of 556 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 97 PID 2328 wrote to memory of 556 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 97 PID 2328 wrote to memory of 556 2328 b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe 97 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 1616 556 winlogonr.exe 105 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 556 wrote to memory of 4228 556 winlogonr.exe 106 PID 4228 wrote to memory of 1408 4228 winlogonr.exe 107 PID 4228 wrote to memory of 1408 4228 winlogonr.exe 107 PID 4228 wrote to memory of 1408 4228 winlogonr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4dd126a8a85297f6695d1e89f8a827b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AWVMC.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD5a1ea25b35c8c55610517cca4fc6efbd9
SHA1055661cdeb49be18323e78f6968c11b596ab70f4
SHA256f8beacc2d3c56f141c8c8a7fcaf2c5ccdffa8756a7cf11b463a0f1555fc6e673
SHA51218a316ac9995edd05fe6095f9895fc2869f8b81ae9c614d860fecec50f40dd24e080c1581d00dea931a4de15900c64536de1aaee46c29f90fd9c2014dc39e0d0