Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe
-
Size
1.8MB
-
MD5
671abad82fb56ab716e9e0ffbca116ce
-
SHA1
3707df01e839d5b67604debfbc762011593eb822
-
SHA256
00d778b5fc11785ec2e51beb292a872a790a54a48889558ca64f03d8e9a1a6fd
-
SHA512
c0d560081734ade5adcc32d401a014b53410270e1a8e97065bf2c04decdeece555762b6834dd20366aa4b75586a6dcdb6616f7b004d8ff429f3681d862bc2bdf
-
SSDEEP
49152:CG6rYHQQFDut9t96xHVur1h63EuHenNMZ+Kzi:q8HQSosHM63EEWNMvzi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\client.exe\"," JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 4 IoCs
resource yara_rule behavioral2/memory/3292-33-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral2/memory/3292-36-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral2/memory/3292-66-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral2/memory/3292-67-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor -
Webmonitor family
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/files/0x0009000000023bdd-9.dat Nirsoft -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 AdvancedRun.exe 2620 AdvancedRun.exe -
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 1.2.4.8 -
pid Process 3580 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3204 set thread context of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 -
resource yara_rule behavioral2/memory/3292-31-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/3292-33-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/3292-32-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/3292-36-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/3292-66-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/3292-67-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5072 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 2572 AdvancedRun.exe 2620 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 2572 AdvancedRun.exe 2572 AdvancedRun.exe 2572 AdvancedRun.exe 2572 AdvancedRun.exe 2620 AdvancedRun.exe 2620 AdvancedRun.exe 2620 AdvancedRun.exe 2620 AdvancedRun.exe 4732 powershell.exe 4732 powershell.exe 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 760 powershell.exe 3580 powershell.exe 760 powershell.exe 3580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe Token: SeDebugPrivilege 2572 AdvancedRun.exe Token: SeImpersonatePrivilege 2572 AdvancedRun.exe Token: SeDebugPrivilege 2620 AdvancedRun.exe Token: SeImpersonatePrivilege 2620 AdvancedRun.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 3292 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 3580 powershell.exe Token: SeShutdownPrivilege 3292 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe Token: SeCreatePagefilePrivilege 3292 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2572 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 91 PID 3204 wrote to memory of 2572 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 91 PID 3204 wrote to memory of 2572 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 91 PID 3204 wrote to memory of 2620 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 95 PID 3204 wrote to memory of 2620 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 95 PID 3204 wrote to memory of 2620 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 95 PID 3204 wrote to memory of 2300 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 98 PID 3204 wrote to memory of 2300 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 98 PID 3204 wrote to memory of 2300 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 98 PID 3204 wrote to memory of 760 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 99 PID 3204 wrote to memory of 760 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 99 PID 3204 wrote to memory of 760 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 99 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 3204 wrote to memory of 3292 3204 JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe 101 PID 2300 wrote to memory of 3580 2300 WScript.exe 102 PID 2300 wrote to memory of 3580 2300 WScript.exe 102 PID 2300 wrote to memory of 3580 2300 WScript.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop WinDefend3⤵
- Launches sc.exe
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Hnvcckcidfhn.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\client.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe" -Force2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_671abad82fb56ab716e9e0ffbca116ce.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD50dfb8df09ee78020de3393c69f2b77c3
SHA1a6dab11239e12d19076328b2164b5d5eb36fd2ae
SHA25675610ff0489ca5d08257264f689ff40a9536efd2f2e4ea8d4f671e0e576ed175
SHA51282fc597deae462581ec792eb08137d9f1ca8cc5045e8ec754b2641659bb2cf75d2be547fccc61a9bad776b5b09be918e80929d551f9531c1ef9650bb9d06a643
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
Filesize
174B
MD5feda97cc79935ff267c380710e5526e9
SHA16a530ce454743f709d4dad5d906094e8186b55f5
SHA256e1747ba74fc44e55409922fe4cb9a610655ae1f62e322dd3e610b08044fdd6a1
SHA512bbdbc421d6f3df0146bfacb503337aa19706e8f81245bc187a2076dea703245f52aaf49e3031a277d040f3405f54122952264be7ad4e0eb3682ffb6e7257ce1f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82