Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe
-
Size
212KB
-
MD5
70ae93451c6c2afe87ac720c26ac78f2
-
SHA1
316eb629d9ce23b78a64f2fab2e493e996cc7894
-
SHA256
4503f3f50d0490a6885db5d061c551cb0fa8571d55ab6285b80b3a9de9ed88f4
-
SHA512
a5897adbdcbdcf118c2776cbe3439682a423f283501456dd7202fe27b5a6ca3bc8dbdfb077557e306bc180170676e3b4b043ae699db4df4e52f55a6ca4406d2a
-
SSDEEP
6144:GslVexvfFck/oQg0nKzsEGQQGq64xjdADA727s94:To5VksEGQLq64nJV4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 magescan.exe -
Loads dropped DLL 9 IoCs
pid Process 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 2792 magescan.exe 2792 magescan.exe 2792 magescan.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\magescan = "C:\\Users\\Admin\\AppData\\Roaming\\magescan\\magescan.exe" 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magescan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 magescan.exe 2792 magescan.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2792 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 32 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33 PID 1172 wrote to memory of 2752 1172 70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70ae93451c6c2afe87ac720c26ac78f2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\magescan\magescan.exeC:\Users\Admin\AppData\Roaming\magescan\magescan.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\70AE93~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d825e4003d1697fd4bc45361e222746c
SHA1e9d4b1073aac15d4dbb430471fcaea549e633d13
SHA256c79e4be74eecf16f2f7f1d39724c938bf372e9568bb96fa4610926a57fe323f5
SHA5127740a18cae5a42963c748a49ac6175482c93b34dce703a7cf24f5828ee6cdc19eb2669a634b64c2a4c861272f7e9b9e943455195a7cd6afcd8fa5586744eb86f
-
Filesize
66KB
MD59eb6cecdd0df9fe32027fcdb51c625af
SHA152b5b054ff6e7325c3087822901ea2f2c4f9572a
SHA25654cf1572ed47f614b0ffb886c99fc5725f454ef7ff919fbb2fd13d1cbe270560
SHA512864742ec6f74f94057b54cd9b09707c0125ac8db4844fa80af201e8b72a811bb68276c993e75bce67e5ece4f83644572edbdee5e963634c5a37839615faea97a
-
Filesize
24KB
MD5ddc0d6806073a5b034104c88288ca762
SHA19663cc10c496f05d6167e19c3920245040e5e431
SHA2562f4767da9dc7e720d910d32d451674cd08b7892ca753ec5c10b11fe85e12f06b
SHA512545ca797a397cfcbd9b5d3bd2da2e3219ba7a294e541831655c5763a7f17480fd0b990d0c2e58ba8c71f81d85472b2da6d079b8211b44c40c8c36d21168ec054
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
332KB
MD5ff0063e52a45b7b303723c62cf8a72bc
SHA13f0a86bebdf67f51422b752bd169bab109af5a86
SHA256667476333f349a64a4f8282ec73d8ded5c091860d987f10fcff2580f9a3aafa5
SHA512fd8287bbc097e977ab53dcdf4a00c7ead7f620f178deddfadcab5e71ec3f247962c2cb03df275fc54878730f23a0c8bf532841faba1e9873649ee98a2e9a7467