Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 04:40
Behavioral task
behavioral1
Sample
JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe
-
Size
647KB
-
MD5
b314bd03990cf08f3ca04dd98ece3e9c
-
SHA1
760dca4682edbefb1bb8636bf1011207b763a7b0
-
SHA256
c6b1edc51c705e8f46ab7b2ddc03378e0f2bdcc4948578eff870aad6d421acd1
-
SHA512
b331dff33995e4e2c7e926cd4f0ea2d40da972924d05d28fe0db2f8de92d0cad5a48ce95819f7243c7efadce11d1ecf17e093c1a7bed9497520123c8715fa47a
-
SSDEEP
12288:Z7atUiy7mu0NYybfyYI2q6xGJOpq8WNaTcR4y1k1p:ZmtUiwmuPiaY60GkpENLR4y1k1p
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2} JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\0\Win64\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\Smart Tag\\MSTAG.TLB" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\Flags\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\ = "Ageqos.Losije.Iqoraja Class" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech_OneCore\\Common\\sapi_onecore.dll" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\Version\ = "5.4" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\VersionIndependentProgID\ = "SAPI.SpNotifyTranslator" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\0\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\Version JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B} JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\ProgID JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\ProgID\ = "SAPI.SpNotifyTranslator.1" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\TypeLib JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\InprocServer32\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\0 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\TypeLib\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\Version\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\VersionIndependentProgID\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\ProgID\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\0\Win64 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\Flags\ = "0" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\HelpDir\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\HelpDir\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\Smart Tag\\" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\0\Win64\ JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\Flags JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\HelpDir JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\TypeLib\ = "{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\VersionIndependentProgID JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E046238F-B26C-42AA-B799-948FE38E2D6B}\InprocServer32 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{25043134-9AD4-4757-FAD2-F1FDE4EFD4D2}\1.2\ = "Microsoft Actions 2.0 Type Library" JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4836 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe Token: SeIncBasePriorityPrivilege 4836 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4836 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4836 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4836 JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b314bd03990cf08f3ca04dd98ece3e9c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4836