Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
-
Size
20KB
-
MD5
77c5926ee5d55e427ef100d9861f784c
-
SHA1
e3c112a4a2217d0efb836de73f067442a4f40967
-
SHA256
122e0727a8fa54dd69820b8262754c2125c3d4e2458fd71bc4413743a7b71662
-
SHA512
cf7ea7567524a0c26b51125ab52dae2c3c057d8320783b871185ab07760eb867a5f175d224b90f00a736298dcb35621e58a3715f7da114bfb2b9fef7884ad5ff
-
SSDEEP
96:etJE33kf8J4UncxuWqCYqBddnl9SEvVc4MV9yVmEi2:KwPdIqeBR99rS9yPi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2372 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2372 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2372 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2372 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2112 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 32 PID 2392 wrote to memory of 2112 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 32 PID 2392 wrote to memory of 2112 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 32 PID 2392 wrote to memory of 2112 2392 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2520 2372 cmd.exe 34 PID 2372 wrote to memory of 2520 2372 cmd.exe 34 PID 2372 wrote to memory of 2520 2372 cmd.exe 34 PID 2372 wrote to memory of 2520 2372 cmd.exe 34 PID 2112 wrote to memory of 1656 2112 cmd.exe 35 PID 2112 wrote to memory of 1656 2112 cmd.exe 35 PID 2112 wrote to memory of 1656 2112 cmd.exe 35 PID 2112 wrote to memory of 1656 2112 cmd.exe 35 PID 2520 wrote to memory of 2576 2520 net.exe 36 PID 2520 wrote to memory of 2576 2520 net.exe 36 PID 2520 wrote to memory of 2576 2520 net.exe 36 PID 2520 wrote to memory of 2576 2520 net.exe 36 PID 1656 wrote to memory of 2104 1656 net.exe 37 PID 1656 wrote to memory of 2104 1656 net.exe 37 PID 1656 wrote to memory of 2104 1656 net.exe 37 PID 1656 wrote to memory of 2104 1656 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop KAVStart2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\net.exenet stop KAVStart3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVStart4⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-