Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe
-
Size
145KB
-
MD5
68311aa2fc6a50e0c2638fe236839ef1
-
SHA1
be7a392491d2eea95f83c3083294f13313669c00
-
SHA256
7a772bf9c2521ddaaffebf2038e5a423daba60381c308ca5ddf937604dc8477a
-
SHA512
894e23b3ee99a21760db3028c423904501f2406084f9f41e2861397ea9104d67890ba2eda30d95a58053ac189fd14b23bdaf9022a969995b4a40bf3a9ec156b4
-
SSDEEP
3072:+T3LDvRNl/kxRM9B2PSOJHVq61dewszl9ZiXuB3wslNMR8z:+T7DvF8xyyAgFszzwu9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2284 B6232F3A2DC.exe 2208 T1QE8AA.exe -
Loads dropped DLL 4 IoCs
pid Process 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 2284 B6232F3A2DC.exe 2284 B6232F3A2DC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AVF7XXVYVZLZXXDY = "C:\\Recycle.Bin\\B6232F3A2DC.exe" T1QE8AA.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3A2DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T1QE8AA.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter T1QE8AA.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" T1QE8AA.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" T1QE8AA.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" T1QE8AA.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery T1QE8AA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 2284 B6232F3A2DC.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe 2208 T1QE8AA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe Token: SeDebugPrivilege 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe Token: SeDebugPrivilege 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe Token: SeDebugPrivilege 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe Token: SeDebugPrivilege 2284 B6232F3A2DC.exe Token: SeDebugPrivilege 2284 B6232F3A2DC.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe Token: SeDebugPrivilege 2208 T1QE8AA.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 308 wrote to memory of 2284 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 31 PID 308 wrote to memory of 2284 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 31 PID 308 wrote to memory of 2284 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 31 PID 308 wrote to memory of 2284 308 68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe 31 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2284 wrote to memory of 2208 2284 B6232F3A2DC.exe 32 PID 2208 wrote to memory of 308 2208 T1QE8AA.exe 30 PID 2208 wrote to memory of 308 2208 T1QE8AA.exe 30 PID 2208 wrote to memory of 308 2208 T1QE8AA.exe 30 PID 2208 wrote to memory of 308 2208 T1QE8AA.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68311aa2fc6a50e0c2638fe236839ef1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Recycle.Bin\B6232F3A2DC.exe"C:\Recycle.Bin\B6232F3A2DC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\T1QE8AA.exe"C:\Users\Admin\AppData\Local\Temp\T1QE8AA.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5d49ae6fcd4b6cd63aec285d5e5bc34a2
SHA12fff7112f737d8e7a3c63ef188cd88649259ae4c
SHA256a9abd3feffbcc75443dcba78eeb90f008e732b340d1a9e5a9e69de101e377f73
SHA512e7247287157641074257021809c028f6887fe8e75471f00c54e547a78401b9e54c4a302309149437f6a8aef0e584be81ae606b5a612dad71012268c6d042acd3
-
Filesize
145KB
MD568311aa2fc6a50e0c2638fe236839ef1
SHA1be7a392491d2eea95f83c3083294f13313669c00
SHA2567a772bf9c2521ddaaffebf2038e5a423daba60381c308ca5ddf937604dc8477a
SHA512894e23b3ee99a21760db3028c423904501f2406084f9f41e2861397ea9104d67890ba2eda30d95a58053ac189fd14b23bdaf9022a969995b4a40bf3a9ec156b4
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be