Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
7512d66833016ba4444831e623d8785e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7512d66833016ba4444831e623d8785e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7512d66833016ba4444831e623d8785e_JaffaCakes118.exe
-
Size
16KB
-
MD5
7512d66833016ba4444831e623d8785e
-
SHA1
88a676d6d191c3e3daa16f5f39cb2cf6084228f3
-
SHA256
937a0de2b80e8e2482408f2a9b6f3f225ddb644ca01827ee5cdc1a6c9a4486be
-
SHA512
5c74368aa99b54a098efcfc98c8b5e383a39578c85c2dde10c13f5df7fdca4ee24e34c1acb3a2fd08cbd79dfbfe6f4915e7495033d603abd98707badb042048f
-
SSDEEP
384:mrW/WbuGOuOoUr86iS4hYteCL7iChjMqHlnfGhjaOgTEhjEU+:tBoUdi+tB/iChQqFnfwjEN
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\430F19F6\ImagePath = "C:\\Windows\\system32\\A480320A.EXE -k" 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 A480320A.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\A480320A.EXE 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\A480320A.EXE 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe File created C:\Windows\SysWOW64\A480320A.EXE A480320A.EXE File created C:\Windows\SysWOW64\delme.bat 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe File created C:\Windows\SysWOW64\BA252AC9.DLL A480320A.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A480320A.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 A480320A.EXE 2876 A480320A.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 4316 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3200 4316 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe 97 PID 4316 wrote to memory of 3200 4316 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe 97 PID 4316 wrote to memory of 3200 4316 7512d66833016ba4444831e623d8785e_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7512d66833016ba4444831e623d8785e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7512d66833016ba4444831e623d8785e_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat2⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\A480320A.EXEC:\Windows\SysWOW64\A480320A.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57512d66833016ba4444831e623d8785e
SHA188a676d6d191c3e3daa16f5f39cb2cf6084228f3
SHA256937a0de2b80e8e2482408f2a9b6f3f225ddb644ca01827ee5cdc1a6c9a4486be
SHA5125c74368aa99b54a098efcfc98c8b5e383a39578c85c2dde10c13f5df7fdca4ee24e34c1acb3a2fd08cbd79dfbfe6f4915e7495033d603abd98707badb042048f
-
Filesize
239B
MD5b6d67be5f068eec05e64d351d045f247
SHA181e90e57fef68b1c34314f6c5d0f9cb4ab15094d
SHA2565a06dc87c850c6ba55d8ca36884ca338ed5ec5ceb2fef46db3a5effb5dc25599
SHA5124fdf6d7408717a01abc820cc8043044ad0944a9a99973b4d2e07d6441f212b30921f4e0f593c96d33e8bc6f7b571dacb472dbdc9ea31ad7903b3a3a5cd674ace