Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe
-
Size
92KB
-
MD5
73a30de30bf7a7900cc2f765f73024ac
-
SHA1
ae0679feb68a23b105aca7c2b890d41f94fdd0c1
-
SHA256
59fc0039a0b621a06606ccdffbfdc8f647942bf7806ee643eb90a61f7ba99a1c
-
SHA512
a9a955011628ce4609b5193b249fc7d8ee4652db0ea597de5cc59bbc0335cff6394dec2adadab54fc5d7eb1d62da47a8d7e24f6deb5593013904f621569a4212
-
SSDEEP
1536:/giuHKiksDOIeAMGXGyoI9y+kpFm94msrP9UnCcyUngZuc163Xqqi9r:YnKtsDOpAMGXGyoI9kpFm94msrP9UCc8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SystemService = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gbot\\svchost.exe" REG.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2748 REG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2696 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2696 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2696 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2696 2840 73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2748 2696 svchost.exe 31 PID 2696 wrote to memory of 2748 2696 svchost.exe 31 PID 2696 wrote to memory of 2748 2696 svchost.exe 31 PID 2696 wrote to memory of 2748 2696 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73a30de30bf7a7900cc2f765f73024ac_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run /V "SystemService" /D "C:\Users\Admin\AppData\Local\Temp\gbot\svchost.exe" /F3⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD573a30de30bf7a7900cc2f765f73024ac
SHA1ae0679feb68a23b105aca7c2b890d41f94fdd0c1
SHA25659fc0039a0b621a06606ccdffbfdc8f647942bf7806ee643eb90a61f7ba99a1c
SHA512a9a955011628ce4609b5193b249fc7d8ee4652db0ea597de5cc59bbc0335cff6394dec2adadab54fc5d7eb1d62da47a8d7e24f6deb5593013904f621569a4212