Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe
-
Size
835KB
-
MD5
764e0300f06558b76f6b81c588b953ed
-
SHA1
1a6778b0ac7844c1826cfaedec3dbca2debd4448
-
SHA256
0561f4160b4b9b9ddac818d5fcaac38c4f1e6ad823d97ee103d33a2ef5b02d7b
-
SHA512
638220572d47c42e748c116dbef458f2a6bcaa00e08473b1707dcaeb56aadeecc1d47c0af51b4a78a86f94723f90dc75e59c795799c7c6893454c04853736fec
-
SSDEEP
24576:D2VHWLRaYmMg8Huu8VKuuDFtHImWmQ/UEoIcyNI:DFam8VJukqP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Admin\\AppData\\Local\\dllhost.exe\"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2812 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1940 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 30 PID 2580 wrote to memory of 1940 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 30 PID 2580 wrote to memory of 1940 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 30 PID 2580 wrote to memory of 1940 2580 764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2920 1940 cmd.exe 32 PID 1940 wrote to memory of 2920 1940 cmd.exe 32 PID 1940 wrote to memory of 2920 1940 cmd.exe 32 PID 1940 wrote to memory of 2920 1940 cmd.exe 32 PID 2920 wrote to memory of 2812 2920 cmd.exe 33 PID 2920 wrote to memory of 2812 2920 cmd.exe 33 PID 2920 wrote to memory of 2812 2920 cmd.exe 33 PID 2920 wrote to memory of 2812 2920 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\764e0300f06558b76f6b81c588b953ed_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD587b7f8ab243669deb60ef571f05e17a4
SHA1b9e20abe8e7bb4ff6b00c20695d88c2b7410d386
SHA256b19841d19d8dffc21449458e64fa279128c289c5e394fdbbb1efc43e7809f794
SHA5126524187cd49b7080813cdd4a1a5301f0393c0a3e2e161a813249e9389ee773dbce38eecf8f0cbf54ccbdfb39915afc2df9c675e176465546beab2b9336b5cf5e