Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe
-
Size
621KB
-
MD5
758f89335cebe33be7ec7da0cde383cc
-
SHA1
f67d3c2433c7edbc0fd96e9f8fbdb454accc454a
-
SHA256
7aa9ef4b44384a74e44041d553e9f86530e4d46e15f7b84eafc32be84e659d8f
-
SHA512
dc5680d43b184a26ca80e714b95a1f2e61d76626e4d5d3f6b4b14273f9156c90d6ba0039105de430b4255406d4523cd77742a5f9f170f6ff2ca10bf3e1e18627
-
SSDEEP
12288:vECgB5Ld8gMxBr6ml6NKOJa25ZF3Z4mxxn8E7PIxyJ00riPeZdRjfd0:MB/Ld89PGml6kO0IZQmXn8E7wxn6d0
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4296 Server.exe 2704 R_Server.exe 836 Server.exe 4972 R_Server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat Server.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat Server.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe Server.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe Server.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe Server.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe Server.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R_Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R_Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSystemtimePrivilege 4296 Server.exe Token: SeSystemtimePrivilege 4296 Server.exe Token: SeSystemtimePrivilege 836 Server.exe Token: SeSystemtimePrivilege 836 Server.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4296 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 83 PID 4456 wrote to memory of 4296 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 83 PID 4456 wrote to memory of 4296 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 83 PID 4296 wrote to memory of 2704 4296 Server.exe 96 PID 4296 wrote to memory of 2704 4296 Server.exe 96 PID 4296 wrote to memory of 2704 4296 Server.exe 96 PID 2704 wrote to memory of 1656 2704 R_Server.exe 99 PID 2704 wrote to memory of 1656 2704 R_Server.exe 99 PID 4296 wrote to memory of 5080 4296 Server.exe 100 PID 4296 wrote to memory of 5080 4296 Server.exe 100 PID 4296 wrote to memory of 5080 4296 Server.exe 100 PID 4456 wrote to memory of 836 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 101 PID 4456 wrote to memory of 836 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 101 PID 4456 wrote to memory of 836 4456 758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe 101 PID 836 wrote to memory of 4972 836 Server.exe 105 PID 836 wrote to memory of 4972 836 Server.exe 105 PID 836 wrote to memory of 4972 836 Server.exe 105 PID 4972 wrote to memory of 1904 4972 R_Server.exe 107 PID 4972 wrote to memory of 1904 4972 R_Server.exe 107 PID 836 wrote to memory of 4748 836 Server.exe 108 PID 836 wrote to memory of 4748 836 Server.exe 108 PID 836 wrote to memory of 4748 836 Server.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\758f89335cebe33be7ec7da0cde383cc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat3⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\R_Server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat3⤵
- System Location Discovery: System Language Discovery
PID:4748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD561411622e6fb11bfd3c8dfc9a5cb11ec
SHA1de71d9f0d1eea3b898c371dcef680cc37efc7e12
SHA2562cc53d6c0d299df575d5ca96b2d8691ab8f1a14eda69a09e0ac8e569bdfbbf63
SHA51210526f77adaeabfd07e4e416eb7ddc019a5fabd9a7cc240eae158321f41cc265e96a58a77772a866cb95f52dbb24f60c9e881bed4d565ab87cd15dd70fa343a7
-
Filesize
154B
MD501e5b17fc2993ca111113c15642f86c8
SHA19f4512b265b18a533eb8ebaba7e6a7b7f1283e5e
SHA256bfddaf9f1c8d334bc65a48141f274e219d173126a6a45dc31d094761ae659d51
SHA5129c830c6d1e539702291cabdfd25d9bae356528e76f2ef937e9f141d2aec83160ad49466d7fbc49e6db27399958b39b9d9dc222b360210f2b3c3e4c947e360c20