Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe
-
Size
483KB
-
MD5
77bc20e83552b7c917260d0a670e4a4e
-
SHA1
58c83895800950e3dd30f4f6ead78ba4c3edf9a9
-
SHA256
2da2aee37a4a5f8a99bc7e94f589ce5cf5adde5bc8e68178d76bf17cba032210
-
SHA512
53ff5780b115e7a17e471e42ce791fa99e26b18a14792d4bc162363782038f3495688b7f67727285620d72de82142f79243bd493bc87eb9510922957c8701858
-
SSDEEP
12288:Ae9+seuKtK4H+/g/PTavuEBAJuuaFRXBU:Ae+sMH+/g/WGESzuRXBU
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 2032 winupdate.exe 4852 winupdate.exe 1244 winupdate.exe 4944 winupdate.exe 536 winupdate.exe 1860 winupdate.exe 224 winupdate.exe 4112 winupdate.exe 2644 winupdate.exe 1028 winupdate.exe 1604 winupdate.exe 3320 winupdate.exe 3376 winupdate.exe 3744 winupdate.exe 3688 winupdate.exe 3480 winupdate.exe 1972 winupdate.exe 1916 winupdate.exe 2240 winupdate.exe 4516 winupdate.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe winupdate.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3508 set thread context of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 2032 set thread context of 4852 2032 winupdate.exe 86 PID 1244 set thread context of 4944 1244 winupdate.exe 98 PID 536 set thread context of 1860 536 winupdate.exe 101 PID 224 set thread context of 4112 224 winupdate.exe 105 PID 2644 set thread context of 1028 2644 winupdate.exe 107 PID 1604 set thread context of 3320 1604 winupdate.exe 110 PID 3376 set thread context of 3744 3376 winupdate.exe 112 PID 3688 set thread context of 3480 3688 winupdate.exe 120 PID 1972 set thread context of 1916 1972 winupdate.exe 122 PID 2240 set thread context of 4516 2240 winupdate.exe 127 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 2032 winupdate.exe 1244 winupdate.exe 536 winupdate.exe 224 winupdate.exe 2644 winupdate.exe 1604 winupdate.exe 3376 winupdate.exe 3688 winupdate.exe 1972 winupdate.exe 2240 winupdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 3508 wrote to memory of 2344 3508 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 84 PID 2344 wrote to memory of 2032 2344 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 85 PID 2344 wrote to memory of 2032 2344 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 85 PID 2344 wrote to memory of 2032 2344 77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe 85 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 2032 wrote to memory of 4852 2032 winupdate.exe 86 PID 4852 wrote to memory of 1244 4852 winupdate.exe 97 PID 4852 wrote to memory of 1244 4852 winupdate.exe 97 PID 4852 wrote to memory of 1244 4852 winupdate.exe 97 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 1244 wrote to memory of 4944 1244 winupdate.exe 98 PID 4944 wrote to memory of 536 4944 winupdate.exe 100 PID 4944 wrote to memory of 536 4944 winupdate.exe 100 PID 4944 wrote to memory of 536 4944 winupdate.exe 100 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 536 wrote to memory of 1860 536 winupdate.exe 101 PID 1860 wrote to memory of 224 1860 winupdate.exe 104 PID 1860 wrote to memory of 224 1860 winupdate.exe 104 PID 1860 wrote to memory of 224 1860 winupdate.exe 104 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 224 wrote to memory of 4112 224 winupdate.exe 105 PID 4112 wrote to memory of 2644 4112 winupdate.exe 106 PID 4112 wrote to memory of 2644 4112 winupdate.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1016 "C:\Users\Admin\AppData\Local\Temp\77bc20e83552b7c917260d0a670e4a4e_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1160 "C:\Windows\SysWOW64\winupdate.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1132 "C:\Windows\SysWOW64\winupdate.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1136 "C:\Windows\SysWOW64\winupdate.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1136 "C:\Windows\SysWOW64\winupdate.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1132 "C:\Windows\SysWOW64\winupdate.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1132 "C:\Windows\SysWOW64\winupdate.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1136 "C:\Windows\SysWOW64\winupdate.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3688 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1132 "C:\Windows\SysWOW64\winupdate.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe 1136 "C:\Windows\SysWOW64\winupdate.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\SysWOW64\winupdate.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD577bc20e83552b7c917260d0a670e4a4e
SHA158c83895800950e3dd30f4f6ead78ba4c3edf9a9
SHA2562da2aee37a4a5f8a99bc7e94f589ce5cf5adde5bc8e68178d76bf17cba032210
SHA51253ff5780b115e7a17e471e42ce791fa99e26b18a14792d4bc162363782038f3495688b7f67727285620d72de82142f79243bd493bc87eb9510922957c8701858