Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe
-
Size
24KB
-
MD5
75d92a0ac40f5f8bd44d267971fad51c
-
SHA1
f62a1dbea3492e2475576acb28f161fe4fc5303c
-
SHA256
a498935939e597425c3e8cbe030ccba7d879d0a5a983190f660d6370514e0888
-
SHA512
23e040fcc1dd5f6c1c4c9824325b075c3fd5ee3ef1ecc8989375be540d13d6779e617c2a979b5b6dfac14853c7742b648b516317c2d15dc3860c1dfe7624f776
-
SSDEEP
384:E3eVES+/xwGkRKJpPpnlM61qmTTMVF9/q5P0:bGS+ZfbJPO8qYoAs
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2824 tasklist.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2016 ipconfig.exe 3040 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 tasklist.exe Token: SeDebugPrivilege 3040 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2408 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2408 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2408 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe 29 PID 2304 wrote to memory of 2408 2304 75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe 29 PID 2408 wrote to memory of 2468 2408 cmd.exe 31 PID 2408 wrote to memory of 2468 2408 cmd.exe 31 PID 2408 wrote to memory of 2468 2408 cmd.exe 31 PID 2408 wrote to memory of 2468 2408 cmd.exe 31 PID 2408 wrote to memory of 2016 2408 cmd.exe 32 PID 2408 wrote to memory of 2016 2408 cmd.exe 32 PID 2408 wrote to memory of 2016 2408 cmd.exe 32 PID 2408 wrote to memory of 2016 2408 cmd.exe 32 PID 2408 wrote to memory of 2824 2408 cmd.exe 33 PID 2408 wrote to memory of 2824 2408 cmd.exe 33 PID 2408 wrote to memory of 2824 2408 cmd.exe 33 PID 2408 wrote to memory of 2824 2408 cmd.exe 33 PID 2408 wrote to memory of 2764 2408 cmd.exe 35 PID 2408 wrote to memory of 2764 2408 cmd.exe 35 PID 2408 wrote to memory of 2764 2408 cmd.exe 35 PID 2408 wrote to memory of 2764 2408 cmd.exe 35 PID 2764 wrote to memory of 2108 2764 net.exe 36 PID 2764 wrote to memory of 2108 2764 net.exe 36 PID 2764 wrote to memory of 2108 2764 net.exe 36 PID 2764 wrote to memory of 2108 2764 net.exe 36 PID 2408 wrote to memory of 3040 2408 cmd.exe 37 PID 2408 wrote to memory of 3040 2408 cmd.exe 37 PID 2408 wrote to memory of 3040 2408 cmd.exe 37 PID 2408 wrote to memory of 3040 2408 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75d92a0ac40f5f8bd44d267971fad51c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2016
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ec31bf589520ab100fed44646a2eb3ba
SHA1336bb48aa09e5953b7c0da2a2017fc88e79f5225
SHA256e344dbf768f256ec58287db73896192de6501536226c40f3d42a1aec0650131c
SHA512f88c3fe028d38c8fe10dac9051ac2e5d1dd52b0646b5e999037c92950036e3b699368dd318a6aafb8392da3c7bfffb070b97a6e5b369930731d679f245629532