Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe
-
Size
28KB
-
MD5
735c5cc08fdca1124fd6fa4c8ba4f95b
-
SHA1
d47d3b2f8b6669a6b895d790d4c0a340f1272e93
-
SHA256
709fe938e254bc99f4cf0fea3ba56d8d25e534f63be6fdd1cca990800f842c1f
-
SHA512
2ee02b2eac611a708813cca79bd7cc074e1f41512a60f32ff31ad323685e9da0a4d0549bb342e0e010a12f9b767d34d15c366420d3a5de9ed9e8776ce5828e44
-
SSDEEP
768:nFo2hPyrHSKvbHiREi7+PcCXcA7tdJwePs6Jug:S2BSy0HGR4cCXcA7rJwe06Ag
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\B9D9BD72\ImagePath = "C:\\Windows\\system32\\E726D3E2.EXE -a" 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 E726D3E2.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\E726D3E2.EXE 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E726D3E2.EXE 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe File created C:\Windows\SysWOW64\E726D3E2.EXE E726D3E2.EXE File created C:\Windows\SysWOW64\19705D03.DLL E726D3E2.EXE File created C:\Windows\SysWOW64\delme.bat 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E726D3E2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2416 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe 2080 E726D3E2.EXE 2080 E726D3E2.EXE 2080 E726D3E2.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2404 2416 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2404 2416 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2404 2416 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2404 2416 735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\735c5cc08fdca1124fd6fa4c8ba4f95b_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\E726D3E2.EXEC:\Windows\SysWOW64\E726D3E2.EXE -a1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5735c5cc08fdca1124fd6fa4c8ba4f95b
SHA1d47d3b2f8b6669a6b895d790d4c0a340f1272e93
SHA256709fe938e254bc99f4cf0fea3ba56d8d25e534f63be6fdd1cca990800f842c1f
SHA5122ee02b2eac611a708813cca79bd7cc074e1f41512a60f32ff31ad323685e9da0a4d0549bb342e0e010a12f9b767d34d15c366420d3a5de9ed9e8776ce5828e44
-
Filesize
233B
MD5e3491e17001a4aa25ae791770613eb65
SHA1efcf8396804c39d40c0bcb2ca8291657e5d82c49
SHA2564ebc430bc999dcc15c7934f9f059d1da3795beeb0257ea960207409ad685f18d
SHA5121663ef493b903ea428cee48811b2fa15a37452fa4653211bf8e252696f67a0ccf324fe06147f1acf598a2c9aedef03523dbec6b1d753f1a16fc99589ceacf85f