Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 04:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe
-
Size
545KB
-
MD5
174e8b5b7c9b026c2042a57485f898b7
-
SHA1
777c745a4cac5d0e8f36a55c65ff075b21c172ba
-
SHA256
12e488be01c536228338c2ea8394f037abe120196da30532f1d206f7ac9c9448
-
SHA512
4ccbcc3ac922a360785e5e6a9425840ad38f27cc2d179cf05085d20d03bfef86ec21c34427d493b1feeb5acbbd47d6d005794c96092977e78b3533cc48606457
-
SSDEEP
12288:3x3e/gePRsOtY/JO2kgV/qjWs9yQsVSzUc:B3Iv7tY/Mbg6WslsVn
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ClipSrv = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\clipsrv.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spooler JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spooler = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\spoolsv.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ClipSrv JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
Executes dropped EXE 2 IoCs
pid Process 2904 wininit.exe 2888 winlogon.exe -
Loads dropped DLL 16 IoCs
pid Process 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 2904 wininit.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DCOM JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DCOM = "C:\\Users\\Admin\\Local Settings\\Application Data\\dllhost.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\cisvc JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\cisvc = "C:\\Windows\\cisvc.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\wininit.exe JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\cisvc.exe JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe File opened for modification C:\Windows\RCXD58A.tmp JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe File created C:\Windows\System\winlogon.exe JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe File opened for modification C:\Windows\System\RCXD609.tmp JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cisvc = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\cisvc.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\Software JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Mstsc JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Mstsc = "C:\\Users\\Admin\\AppData\\Roaming\\mstsc.exe" JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cisvc JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 532 wrote to memory of 2904 532 JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe 31 PID 2904 wrote to memory of 2888 2904 wininit.exe 32 PID 2904 wrote to memory of 2888 2904 wininit.exe 32 PID 2904 wrote to memory of 2888 2904 wininit.exe 32 PID 2904 wrote to memory of 2888 2904 wininit.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_174e8b5b7c9b026c2042a57485f898b7.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:532 -
C:\PROGRA~3\wininit.exeC:\PROGRA~3\wininit.exe /a 12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System\winlogon.exeC:\Windows\System\winlogon.exe /a 23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10B
MD5cdaa9113a06432eb4d00be7b30981af4
SHA1009f16d845a7352c4451d1af6dd299b0e5d7cbf5
SHA256b552b69138abbe8137594e563fe18b669acc3e29308de83bb877a33375111bfd
SHA51226d940a825f5d9b3adbfc939a7a9c1968b7cfbaab212995d36a47179f618a4fba130ca29d65f21a78906cccbd71cc7bbe01625adde71f49324b81cd5b9c74bba
-
Filesize
545KB
MD5174e8b5b7c9b026c2042a57485f898b7
SHA1777c745a4cac5d0e8f36a55c65ff075b21c172ba
SHA25612e488be01c536228338c2ea8394f037abe120196da30532f1d206f7ac9c9448
SHA5124ccbcc3ac922a360785e5e6a9425840ad38f27cc2d179cf05085d20d03bfef86ec21c34427d493b1feeb5acbbd47d6d005794c96092977e78b3533cc48606457
-
Filesize
545KB
MD5c49e7430f9703a6c38b64286b1ff5c1f
SHA10c710e3fd2ab44d91b97ff9be76768b44fe033ea
SHA256c7a13763bb284bed12b93d8e8f7e8b3b082871b4eb13244d982407794805042f
SHA5123636311ee1c38c4e67e57c1fdb49d6026cc82395af5f63b84d7e674c2fa6a58cb9793ebea2df438f44fd7cc5116ca589bc05c630526a7aa6952e8a76b823b464