Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 21:11
Behavioral task
behavioral1
Sample
714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe
-
Size
28KB
-
MD5
714053bc16995cdbbb1cd56d770f6ebb
-
SHA1
030066593b425ced7be6a165dce41e9ad6d813e5
-
SHA256
03e5e67b303aa47f1da2ef5b2f00bee1a322701e381eeae2f0e95a012304e190
-
SHA512
72ed4ceb824cedc3d06bf1ec2fecac440b96b017f6b4458f73c6965b0199c2b5d22e4d072277ca55022c2f081200158a4ce11f80ed42a06552444cc03958e59d
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNLlPVs:Dv8IRRdsxq1DjJcqfmVs
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
pid Process 3880 services.exe -
resource yara_rule behavioral2/memory/4948-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023432-4.dat upx behavioral2/memory/3880-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-37-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0010000000023379-51.dat upx behavioral2/memory/4948-131-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-183-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-281-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-282-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3880-284-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-288-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-289-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-326-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-327-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-491-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-492-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4948-692-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3880-693-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe File created C:\Windows\java.exe 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe File created C:\Windows\services.exe 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3880 4948 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe 84 PID 4948 wrote to memory of 3880 4948 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe 84 PID 4948 wrote to memory of 3880 4948 714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\714053bc16995cdbbb1cd56d770f6ebb_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5706ce4583fb7e174ccf4d3c8320b02d1
SHA167efe83c8f25f3a0bd282d469aeda3162c1b19d7
SHA25682a58c2ca69ad8e52efd5e0533150f12430f560ee56d885237b8e486be743b90
SHA512920deab7da828f4e54841a8a0c03a165619c008bf2019c7f9ef58eb793a0d01c96dc48f1f2460e0bd0e1b801acff27cfddbd1771db8635d17a0fe411e9f4b6dd
-
Filesize
144KB
MD50314d35eba2742aa1f1ef1435a99f340
SHA15c9ce4edf29508c6b66e3366fe4de70f3df0a0eb
SHA256f5b5689551a2056581f73ba39b3048ec58733038064ed0dc43fe59af3e5df4f4
SHA5127fbb43c435b90443e02637d2e7ec654cb2c3717590de90f518cebe92665b1f4c814d54d362963a4c7ac6c7a27b7c712866c9c237b75dcc709c14e6f2b035be1c
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
130KB
MD588d86ef3e12461eb18529cceb2fc84f1
SHA17111b1d3e6c90f631e127138b1e4e5356c1f1cbc
SHA2569b36354822879d8ad580ee2d9238837d3ed959cd594ccd24f556e5e5ff212461
SHA512786051a8f4847cc4da2142fca3637d8293274d11fb504ac57050f42f72c189d6bf16540e72ea848ce2516678e26ac102785f4e8c4d60a1033b3b910850adca9b
-
Filesize
172KB
MD55392d1fec66f782b9cde6bc1b221e7cd
SHA15d9a96bb18dfb9394c1b8bc35203c421565d12c0
SHA256130631a016e6ec37376b0afbb0d53fde2919b4f9c4a039ea1cdbfad59447ad92
SHA51264d94336fdfa926824c25aa2416963030b7a03e43710af69c55b53343b7078dceb56499e41f67e6aceb531e837bb7a22dc539895761ffb046ccaca410a825216
-
Filesize
188KB
MD5cff29c15d737288157c6d6140853cf8a
SHA12eb98fcc26399722e161b0f25789ee49529fdf4c
SHA256ad390fb09c3129ca78998a7a596c3bba70f8724a76d222abe53101d068bb515c
SHA51236a0e2967bfb86fcd1e19458ed2871665a07aafa15a95ca024dedf3d0426c85903924139728656bd567875186c0eebd95251f02a4be018acc3ed03cd22502cd7
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
162KB
MD5870fd7a55a2e73c8ffc413ced2b62036
SHA14d7bccabf9c9122480a81321d18bafabaf1701ad
SHA2564bee8bdd37756c65515b64c69b7587b449e8db3a8fc388da92beea14a6c3dee8
SHA512d12d483fa1d591ddda144bc57ceab083ab19fdf05fc4bdd30ed27a913cd162034924b570637fcfcee95d76379bfea1fbddbd5176a282c8783768fafcbbe3cbbb
-
Filesize
173KB
MD53d5921eb825e209cfeb9aa32b75a4736
SHA1837003d2ed7d5ccf5a0111b95985ab9ed8063d0f
SHA2565afb697f6c0e76c82184d8605ff5890efe5952b7ee48f721288907d08e16819e
SHA51253c2338ba32b600109444f162ccf6f934fe4574aa8121ecef077b2c30dea81b1ce5d9e98766cbd96e0145d4e70f33c7855e1a04115135a9fecfd55e749f6ce26
-
Filesize
137KB
MD57deee1fb2da38d1b16ee962f4c4aeeb1
SHA1000547936698c4a3a20dbf7ab3cfd8c6a60770b1
SHA256df0ae96a66127667695262ac123d3d700c70a5e994001bf753a1fcc931f58dde
SHA512a03fc2f511c704779b8918b81048bd384d9005013c03e69f474862940ee150b8887e8bd6fcc6276e3a574e1fd657c33d0d6d8e2a6fd5997d27e1becd6705fa01
-
Filesize
149KB
MD5f2ff793eaf588f2d9ce8bebedca472dd
SHA1bfdc5c3f5a7880e5b07f5a968d22a4eefa0af944
SHA256358aaa5f78dd5a26ede08184e9fcfb1151691b970ff9c6b06962343668f8cc56
SHA51263231f9885f7d7366714c40fdfa2a1216fcde02f5a8836591870e2bb08680d456d930742757b2c2ac61f1719806b75c2c94d149cfa26c89a2ef63d7d88790da0
-
Filesize
137KB
MD5a32c53edfb8358ad90f484a4386816f6
SHA1186657eaedd4dfe0459003e6c850e981fd172304
SHA2561dbe550d27ad57ed49ad7be65246686cd19a2c9bec32e644d50772bdf7d237b4
SHA512adff8d8d65b847af258bca9b17a2987e2c21662ff04ea510330b280addbdd984e8c0a5a255f5466ad5121a7be43cdab2c6edd1a57a56d0fb5148ed69a2eb2676
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
Filesize
123KB
MD529581fe67dae69464a772d18b4acfabe
SHA19400bb5e6f4208bdfbd44cbda6a86d8b7aca067e
SHA2563329cd6d33158a7870ea39dc2072694b13f3d1f28377a41eeb897737b19338ce
SHA51215e9bf11546adb4fb194f1c0131e394cbcb7d1466610dcf362f8dd29b49e629307faa27c13f72f929c37cfff18523f170e57775dee5c0cb2426587e0c07f996f
-
Filesize
159KB
MD50915ee5842bfd0b6049f8c3a73feb974
SHA1f72d8e103d1a523ecd603c1da488cec1733ebd91
SHA25691daa5e01ea3c67b372d906943cddbf1cacb100092298e83d1c4a5e0d12f9247
SHA512443dde49452894434bf8b41ad92ff4a30b6948e2fac761b6e161c25774915db1aecce32f0e60debda0961943836d6a3c2c983e4e1145b7a5220cfe594e3d55f8
-
Filesize
177KB
MD594b16b3ed071d590b9294448c18e646c
SHA1a5f97db61df34017c22a4c3bc8b006894b4b33bf
SHA256ca2dde2dd40a86099812af2619582697e0ababc64e1c81f3f560d94fe6d33540
SHA5128d47338b42f30a856a1736f140164cfe5105feaca893973dfd8cf6b8432ef4fa0da2a6874832b1ccc2be00abaccdd0b560087a7064564a62550b6e0437aa6770
-
Filesize
175KB
MD5b20a7476006045e40835646aa6c4227a
SHA129482024f6549a09aae0106e3f3484edc2c28ccc
SHA2563ff66a0349251a28902482cef0809268d73934ad1113119e3523b4e2f5cc4958
SHA51214fdfc3ebd1e2b8c03f6201b35981794cc9831ce6340999b6458e45bcfe894aadaebed6511a758e4c7b95c1c8aeaa79d07509c77375f2a45402a71ed4af20948
-
Filesize
138KB
MD556ef7391120ceee994717228c07f7bea
SHA177d84c3bf73f8794ddca1b77d262641cba365d20
SHA2569bc57e5754415810d047be4d983941dd50a1a9b6e5fdc9ea9ce7da5dba5dbde3
SHA512814f7476a9a9577025f7f65d9e59f59b6eb89141e2fefc58c8b091fe5279539f5a4f7f0d266a59e42518e1edd5a13537dec8a538f9ef499c1707a1ea6165dfa1
-
Filesize
149KB
MD59881ff00ee86ddde297ad67428bdeea5
SHA1b1581ef6f1968ae2870a20322e0cdf90b260bd17
SHA256376cb4ce89f2570a1304b7fd0d9ffb8dbb1179e381048e4ac3a5f077d2984bd7
SHA512c95d228601e4a4584303835eb68ff7d69b20c3c09f252555adf2173cd7fca2cc7526c3a7365d0ca90c5741dd51cdb2268c04974cf982e6c08e3271335ee4ef16
-
Filesize
169KB
MD5e100e4a040af5e0052297b3e29db212b
SHA196669c0b7d212d3a1de6c3bba960cf5a334ad427
SHA2560d5fc9e9a3d9766206c805fa2361754b92092eb6adae50ed436fdb5f321500a9
SHA51230c639c7fb74cedca63d5b4797b993a30d3fcc67dcc61efaef837652f05a2ef62adb1f16c57fa49d97ff010b07384b1345046d3b78eae33432daeb16cdc66f8c
-
Filesize
152KB
MD5548d4c287f8cc9cfc9a90f0483e88956
SHA1d79566e9a2ba7aae2778d22b0458d15ba5e11365
SHA256526d406ecc54e89f182967f6ac28f7dce1da2bb33ff42c46c8773d2a48fd9804
SHA512a20fe668a17f8be56a10d53efc250b14dd97ad5c045aaab850feb551e48108fd82eede0c99e4316f9f3fc4dfe7aacdab09d4b6c9cd4c0763e202f5531d953e57
-
Filesize
28KB
MD5d934550df51176864db5477bac163fb1
SHA1b45401e782c3bd07941184cd53eeb491ab17c2eb
SHA256abce2fe6442a4c8751223a8dc0600c0eab8edd902ce36937cbbc879a79aeba73
SHA512fa738556adde9753c1679f9a2b452f19a9fb5bb7f38a4b64da42d5609613eeb5d990974c52a43d0fe8676c8d35d0b426c39391570cd0c398413f65e17ca2ccb5
-
Filesize
1KB
MD5c08cdc540a63530fa7ea04aef0abe617
SHA18bace637d84f4c060bb34ca73c08ad6c61fa8dae
SHA2566ffddc50cfb0148ffb74db28b81ceacbbddbe12a92839b489705af8ae0b92d5a
SHA512b6bf42280e4828694de960f0d7a84804a26f1a3af9678f8c607f2b54f21a194c15143cc77f077ac4ac56d59677427a700c3d9f5d5a0eafc62a1ce54671a1fb1d
-
Filesize
1KB
MD5cf09c2565a06bb318d4236348b588c9a
SHA196d82f460ba7c011f688a9c24857e5cfdddcad0d
SHA256200428eedba7fc28c5fed01819f49c7104c17882560784d811557423712a2539
SHA5128568a44d07eb2d9811fc92115af6df781ae8d2672a4ff5a70a5f4c4d621ed2f9a0e9f3b4ad56e8307b4fd530b780e6bbf5a0c2a48cad22cead169aa964e6c3f7
-
Filesize
1KB
MD5bf38f56f4326670dcbde80e5a66b65cb
SHA1726a02e7a3edfe1d0e0d867de9c8c12f308be39a
SHA256be73c2eb3294fa26e1f40c40173e556988cb3162dddf1247f2b31329d8c7149f
SHA5122678145e184f1ed377a9b560626639b774b938e92c17437edd5896a9c508038a24a7641e8efb74671a56e61d9f48cbf9b6c8cc419b7bb10707b91ab8fd35466d
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2