Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe
-
Size
356KB
-
MD5
6af4b6a1740064715282dd3ddc03f25c
-
SHA1
ab123c3d7852a0246f829a0d7815793b5237bd82
-
SHA256
9bfb7b29b07d5f4bf989ea1ea53d40996cd732179ee848a7ad33a5583b195b4e
-
SHA512
5064a521970a4e705511d073c3c872d6392374cbeb85d84114377bfcb669691743e5cf304b31d27e3205621d652de5f2f518805262123c3f3577347ac6dbfb6d
-
SSDEEP
6144:7vbx8BFbAFUOPqE2OZm8vY3RuTCKWUaQfb+BscWoh/tJ4u:7aAFUXEtR+gWw04C1J4u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2864 f1njg4mal7GI.exe -
Executes dropped EXE 2 IoCs
pid Process 3248 f1njg4mal7GI.exe 2864 f1njg4mal7GI.exe -
Loads dropped DLL 4 IoCs
pid Process 4880 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 4880 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 2864 f1njg4mal7GI.exe 2864 f1njg4mal7GI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\G5EdPPN7BTxf4BD = "C:\\ProgramData\\UjBZ3qPMqGXvtfK\\f1njg4mal7GI.exe" 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4532 set thread context of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 3248 set thread context of 2864 3248 f1njg4mal7GI.exe 89 PID 2864 set thread context of 872 2864 f1njg4mal7GI.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1njg4mal7GI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1njg4mal7GI.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 4532 wrote to memory of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 4532 wrote to memory of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 4532 wrote to memory of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 4532 wrote to memory of 4880 4532 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 87 PID 4880 wrote to memory of 3248 4880 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 88 PID 4880 wrote to memory of 3248 4880 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 88 PID 4880 wrote to memory of 3248 4880 6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe 88 PID 3248 wrote to memory of 2864 3248 f1njg4mal7GI.exe 89 PID 3248 wrote to memory of 2864 3248 f1njg4mal7GI.exe 89 PID 3248 wrote to memory of 2864 3248 f1njg4mal7GI.exe 89 PID 3248 wrote to memory of 2864 3248 f1njg4mal7GI.exe 89 PID 3248 wrote to memory of 2864 3248 f1njg4mal7GI.exe 89 PID 2864 wrote to memory of 3092 2864 f1njg4mal7GI.exe 91 PID 2864 wrote to memory of 3092 2864 f1njg4mal7GI.exe 91 PID 2864 wrote to memory of 3092 2864 f1njg4mal7GI.exe 91 PID 2864 wrote to memory of 872 2864 f1njg4mal7GI.exe 99 PID 2864 wrote to memory of 872 2864 f1njg4mal7GI.exe 99 PID 2864 wrote to memory of 872 2864 f1njg4mal7GI.exe 99 PID 2864 wrote to memory of 872 2864 f1njg4mal7GI.exe 99 PID 2864 wrote to memory of 872 2864 f1njg4mal7GI.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6af4b6a1740064715282dd3ddc03f25c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\ProgramData\UjBZ3qPMqGXvtfK\f1njg4mal7GI.exe"C:\ProgramData\UjBZ3qPMqGXvtfK\f1njg4mal7GI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\ProgramData\UjBZ3qPMqGXvtfK\f1njg4mal7GI.exe"C:\ProgramData\UjBZ3qPMqGXvtfK\f1njg4mal7GI.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe" /i:28645⤵PID:3092
-
-
C:\Program Files (x86)\Windows Media Player\wmpconfig.exe"C:\Program Files (x86)\Windows Media Player\wmpconfig.exe" /i:28645⤵PID:872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5a99c0e30a104bbb91221097e7245ca7b
SHA18aab568013b8381be319d5dc91f893da42a0d47b
SHA256461497efaa586095bc22e996a49c73f506dcd5255083bd12455c3f13922876cf
SHA512f96ffd2cc6a5089f48a3ccad21da95f08b1abeadb1ff999dd1d7d0ea7710eb63728bea240566d9e9d08c056266a4b24cc9af3760e919de3a2f8fbfa3501dad49
-
Filesize
356KB
MD56af4b6a1740064715282dd3ddc03f25c
SHA1ab123c3d7852a0246f829a0d7815793b5237bd82
SHA2569bfb7b29b07d5f4bf989ea1ea53d40996cd732179ee848a7ad33a5583b195b4e
SHA5125064a521970a4e705511d073c3c872d6392374cbeb85d84114377bfcb669691743e5cf304b31d27e3205621d652de5f2f518805262123c3f3577347ac6dbfb6d