Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
submitted
28/03/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
006c50e0d2c17bdcf357c18c33c16bd4
-
SHA1
30c7fd7f2ed979b81df64c5130a7aaab0514197f
-
SHA256
fa3d137dbf86138f13a9a51fdf586222f72d2201962a6aa9c5890aa3c2c097a3
-
SHA512
fa59cf0b02c60cf0542ea2fdea3bf275237179998625312425c44f3543783acf1cfb8da51624c0998dc4bf0c1e85335561c1507ba1e0037e83f57c4e9ce6479f
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHa2XOS+/ODFJ2ifnTBMJ52cDT0F5:sh+ZkldoPK8Ya2X2WzlMJIcna
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3656 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\111.exe powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\111.exe powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1564 set thread context of 4116 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 108 PID 1564 set thread context of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 set thread context of 3528 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 111 PID 1564 set thread context of 2612 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 112 PID 1564 set thread context of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 set thread context of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 -
resource yara_rule behavioral2/memory/4676-26-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4676-29-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4676-32-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Program crash 6 IoCs
pid pid_target Process procid_target 3148 4116 WerFault.exe 108 3416 3528 WerFault.exe 111 4328 2612 WerFault.exe 112 1192 4676 WerFault.exe 109 4644 4712 WerFault.exe 114 4576 4568 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3656 powershell.exe 3656 powershell.exe 3656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3656 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 106 PID 1564 wrote to memory of 3656 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 106 PID 1564 wrote to memory of 3656 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 106 PID 1564 wrote to memory of 4116 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 108 PID 1564 wrote to memory of 4116 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 108 PID 1564 wrote to memory of 4116 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 108 PID 1564 wrote to memory of 4116 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 108 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 4676 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 109 PID 1564 wrote to memory of 3528 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 111 PID 1564 wrote to memory of 3528 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 111 PID 1564 wrote to memory of 3528 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 111 PID 1564 wrote to memory of 3528 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 111 PID 1564 wrote to memory of 2612 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 112 PID 1564 wrote to memory of 2612 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 112 PID 1564 wrote to memory of 2612 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 112 PID 1564 wrote to memory of 2612 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 112 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4712 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 114 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117 PID 1564 wrote to memory of 4568 1564 006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden ( Copy-Item -Path "C:\Users\Admin\AppData\Local\Temp\006c50e0d2c17bdcf357c18c33c16bd4_JaffaCakes118.exe" -Destination "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\'Start Menu'\Programs\Startup\111.exe" )2⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 803⤵
- Program crash
PID:3148
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 6403⤵
- Program crash
PID:1192
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 803⤵
- Program crash
PID:3416
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 803⤵
- Program crash
PID:4328
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 6523⤵
- Program crash
PID:4644
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6403⤵
- Program crash
PID:4576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4116 -ip 41161⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3528 -ip 35281⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2612 -ip 26121⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4676 -ip 46761⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4712 -ip 47121⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4568 -ip 45681⤵PID:2720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2712 --field-trial-handle=2264,i,1475924722205134884,16549311107360026087,262144 --variations-seed-version /prefetch:81⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82