Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe
-
Size
378KB
-
MD5
7598fa8e511f62c71f26fe400d59274c
-
SHA1
8c58c0ab83af4433c5fbdd44cca1a9f457393500
-
SHA256
a1f3517e788cdcd858100b2a9d8150af35ded70680f1ef1035073c16d1b42ad0
-
SHA512
e3f9f35f281db8bf7bde4fc1f61cc8a0cc8876244ac78c79333459c9c699ad2af4e2da75224ab8100dcceea322ea92a717efa435e03fbffc68fc96dcc5040a88
-
SSDEEP
6144:hWSbdBjwzR/7LisOhbUwls8fH7SCl9PM75hE71UTU3OmgJwUzRi4GOVHtNYlq22A:hWSbd5SohbUwlsC9k75hE71Ue+Xz04Gh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2384 d.exe 472 doc -
Loads dropped DLL 3 IoCs
pid Process 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 2384 d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\doc d.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat doc File opened for modification C:\Windows\SysWOW64\doc doc File opened for modification C:\Windows\SysWOW64\ieapfltr.dat d.exe File created C:\Windows\SysWOW64\doc d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat d.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2384 d.exe Token: SeDebugPrivilege 472 doc -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2384 2088 7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe 30 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33 PID 2384 wrote to memory of 588 2384 d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7598fa8e511f62c71f26fe400d59274c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
-
C:\Windows\SysWOW64\docC:\Windows\SysWOW64\doc1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5fd4f4346428fa5aea1ac0f1f548fbf35
SHA1e6e369469eb079cf75a901ed6e169a3a3f4d76b3
SHA256a9a95af8b288704e17f39bd714c8339538e284aa7dbdfb3788cf868e21677bc4
SHA51222a13594e51499ac93b763ecb616bfecd00c47e68ab8a8d308d11bf8ad09b8a0d14c98f0096f1639abbf5010b04f93512e7c31f5ff01d67f81ad94dd74d347ed
-
Filesize
743KB
MD564865b77792442e33daa2ffb4bf22010
SHA178b3fd6d221e93f7ff277ae4fc3386064382f60f
SHA256a1b0b9b080be15800d865e7c6b5438ce13c872d12fa346f322567d725aa18bcf
SHA5126edb226707128dd1798b42fc538e1b88f36363d7ce704d12cec9f7ffefaf4a8328b6463bc6dc3e71bbd4b7ea59571a2b7d3dc5d3fa3aa024274487756da7ac0d