Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe
-
Size
672KB
-
MD5
6ff25c4c12b84f2cb1b26fe8059a5bf4
-
SHA1
9f8dfbff57c2a2f6247946635899446e5d2fce90
-
SHA256
e4d6f6a064b6342dfd55a90f25bc27056bbcd64efeadd28fd2b9aae4e8c135a2
-
SHA512
99748b83cdb4cf0b421d31214a18a5fdf63ede9bd8a18b886b80b887396046e87ceb227995eb8871d396d19940156474df8f32af0bdeb45b9da401964ed6bf26
-
SSDEEP
12288:SeuOpm1o+LcHAjbFgx52l4WjNT2BObzG7Cwk5+tWe7e7ZgahFRBE3Rad3m:J1jIXfj9zG7qoyZtruMFm
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{560054X8-B52E-DBK1-G05M-3B1V762T5UD7} 2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{560054X8-B52E-DBK1-G05M-3B1V762T5UD7}\StubPath = "C:\\Windows\\system32\\googleupdate\\google.exe restart" 2.exe -
Executes dropped EXE 4 IoCs
pid Process 3020 1.exe 1312 2.exe 2384 1.exe 2832 2.exe -
Loads dropped DLL 6 IoCs
pid Process 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 3020 1.exe 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 1312 2.exe -
resource yara_rule behavioral1/memory/2832-39-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-41-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-49-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-50-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-51-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-43-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-53-0x0000000010000000-0x000000001031C000-memory.dmp upx behavioral1/memory/2832-69-0x0000000010000000-0x000000001031C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\googleupdate\\google.exe" 2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\googleupdate\\google.exe" 2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "%Nighty%" 2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\googleupdate\google.exe 2.exe File opened for modification C:\Windows\SysWOW64\googleupdate\google.exe 2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3020 set thread context of 2384 3020 1.exe 31 PID 1312 set thread context of 2832 1312 2.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1312 2.exe 2384 1.exe 2384 1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 1.exe 2832 2.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3020 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3020 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3020 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3020 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 1856 wrote to memory of 1312 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 32 PID 1856 wrote to memory of 1312 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 32 PID 1856 wrote to memory of 1312 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 32 PID 1856 wrote to memory of 1312 1856 6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe 32 PID 3020 wrote to memory of 2384 3020 1.exe 31 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2756 1312 2.exe 33 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2764 1312 2.exe 34 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 1312 wrote to memory of 2832 1312 2.exe 35 PID 2384 wrote to memory of 1212 2384 1.exe 21 PID 2384 wrote to memory of 1212 2384 1.exe 21 PID 2384 wrote to memory of 1212 2384 1.exe 21 PID 2384 wrote to memory of 1212 2384 1.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ff25c4c12b84f2cb1b26fe8059a5bf4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\2.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5ec565469766ed9a4b9fb6194fb8476aa
SHA157ebaa661ec8f1d6a386f311c6c5a38131e5fab1
SHA256fff1f27b7cc5dd8770f559f97e4f6fa44b7bb1011b68f439ab2186cd28a2b92f
SHA512ed94f83089aa263e02a8e23f122e3b586afa008c3c779fdb8cafe8d5618fd3b0957d001248e5d778c2c3c06ea551a5eefa3bfa03f0f7f4a860db18f220f54cac
-
Filesize
375KB
MD58dbee89ed02e73575da6de823ab05441
SHA1d19c5949c487625a4391e7aeb921acadfcd1d250
SHA256df67f1ce9badb2306f7ebbd087662312740a9a4c7e701ba1f78a00a5e94abf47
SHA51227f8145f63a80409004c45ca3cb55d002aba9444b4a0413dd160be01f0fd9c056a12fa0d2334ac049e7d9475c077d5e935e55e0e7209663c510f867711e913a9