Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe
-
Size
13KB
-
MD5
6a132b5be10489db0d0ac619f8ac2f07
-
SHA1
3b1a2729d5ac7bac20555fe7a507a6727cc7b6bb
-
SHA256
bf91bcc6a14edcd462c386e18d4fcd1436ea4922e1c822e8e4936ed31aaf757a
-
SHA512
f62fcabb1d587e364a7b674347669a933e3fe24ef9d2095ff1560b040ad10ba96bcecc80f936f03a512fa7508c9cb807980401ac2b0747f4a2e2cf09b459993e
-
SSDEEP
384:lWSFaWrOXhxReOzWcHUI3j8NswacbI4gSgaaK6r4vX588xJ:bPUhx3z/HUIz8vacs4gnrMBJ
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\E0D3B8B8\ImagePath = "C:\\Windows\\system32\\E0D3B8B8.EXE -service" 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 E0D3B8B8.EXE -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\E0D3B8B8.EXE 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E0D3B8B8.EXE 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe File created C:\Windows\SysWOW64\E0D3B8B8T.EXE 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe File created C:\Windows\SysWOW64\E0D3B8B8.EXE E0D3B8B8.EXE File opened for modification C:\Windows\SysWOW64\E0D3B8B8T.EXE E0D3B8B8.EXE File created C:\Windows\SysWOW64\E0D3B8B8.DLL E0D3B8B8.EXE File created C:\Windows\SysWOW64\delme.bat 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E0D3B8B8.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe 1800 E0D3B8B8.EXE 1800 E0D3B8B8.EXE 1800 E0D3B8B8.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3028 2460 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe 32 PID 2460 wrote to memory of 3028 2460 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe 32 PID 2460 wrote to memory of 3028 2460 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe 32 PID 2460 wrote to memory of 3028 2460 6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a132b5be10489db0d0ac619f8ac2f07_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\E0D3B8B8.EXEC:\Windows\SysWOW64\E0D3B8B8.EXE -service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD56a132b5be10489db0d0ac619f8ac2f07
SHA13b1a2729d5ac7bac20555fe7a507a6727cc7b6bb
SHA256bf91bcc6a14edcd462c386e18d4fcd1436ea4922e1c822e8e4936ed31aaf757a
SHA512f62fcabb1d587e364a7b674347669a933e3fe24ef9d2095ff1560b040ad10ba96bcecc80f936f03a512fa7508c9cb807980401ac2b0747f4a2e2cf09b459993e
-
Filesize
239B
MD580e22a7913219dac2fbef0c665e94ed2
SHA16f21d52b193eb616d1cb4584a75ad96704b891c7
SHA256118b2dda039f3d57baf1b496778bf8c91571e661275715dfe8f92a5bfe908b7d
SHA512f85d0993981d7287b26d0fca7a24020152a26e547b4fc6a705ca46d467d6e4f4d805a54f03cc6fd111e72af2e1a94c792534a7f84f090ec1768ce1c5b75d6666