Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe
-
Size
301KB
-
MD5
70f600e8ca8ebcd759359b435e1a6603
-
SHA1
5d41b7ae26b2fd00fc30f0c9b208bb0097411378
-
SHA256
250c349ea673b641d7834b82ef5a2733508bb49b01315374e7a5370cf05e9e1a
-
SHA512
734f82cb02de5517d2affe7bdb18a4d5522949493b5a06279c623108bce1aa933ded977e3b04def6151d81dde07e6fb4896c45ce0c2f866223dbb2620edc1821
-
SSDEEP
6144:cJEYERqaQiEYixXAkmOgoUpMEEdlntRb5A+na4S35EQwk:+5+qntJxjfg5mxdltZ5A+na4RQwk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3604 svohst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3604 wrote to memory of 3536 3604 svohst.exe 91 PID 3604 wrote to memory of 3536 3604 svohst.exe 91 PID 3604 wrote to memory of 3536 3604 svohst.exe 91 PID 1848 wrote to memory of 4040 1848 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe 95 PID 1848 wrote to memory of 4040 1848 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe 95 PID 1848 wrote to memory of 4040 1848 70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70f600e8ca8ebcd759359b435e1a6603_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:3536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5da76814fb8d6fe3d1d53b2647970cf83
SHA189678dff99d5e7b8fc8a41f9ccc249aeb04870a9
SHA256bc7dcf9bdd564c6599a0800d4efd65c7ddf179aec3a666485c0b215f195ed45a
SHA512fea47740c6e80fd096660e2f8d8a8dd20a05765ecc80a3a382b23fd387a880ff99daa596fce37a48aed2ea3bd99762957baac9f43d152736971b2f03e2e65d9e
-
Filesize
104B
MD52eec7e3ae21b6acc8fb8cf0a2f7323aa
SHA10e6a8a87b7c2848ffec860a6955a44a2c166ad9b
SHA25678d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2
SHA512e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281
-
Filesize
301KB
MD570f600e8ca8ebcd759359b435e1a6603
SHA15d41b7ae26b2fd00fc30f0c9b208bb0097411378
SHA256250c349ea673b641d7834b82ef5a2733508bb49b01315374e7a5370cf05e9e1a
SHA512734f82cb02de5517d2affe7bdb18a4d5522949493b5a06279c623108bce1aa933ded977e3b04def6151d81dde07e6fb4896c45ce0c2f866223dbb2620edc1821