Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe
-
Size
24KB
-
MD5
77e42cc75546ad9178782898f96c9aa1
-
SHA1
7e6c8a4bf5e5cf899ae6a6a4664fa2afbbeee656
-
SHA256
b23f9ebf62bf57cfc127221bcfadc34bc0d7fc9174ccad0c1e161e53879752b2
-
SHA512
e52eb45e0b969ca6e8266a1b3f1b1e7bb8f0da73a873c1613ed04b7ff7f5bc5ad06ee9129ba8eef3260941afdb189e71299e6c4ef24c20a3a02d3f330b5d3aa4
-
SSDEEP
384:iXGGP+MQ9aBfDnnII1k/9lMllamE6OLeJpa+iZhyWCOqOIxBQUzQ//:ZGP+3aBLnHk/XMllare/a+iZhyWVqOIQ
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\hkkhhk\Parameters\ServiceDll = "%SystemRoot%\\System32\\hkkhhk.dll" 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1388 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 1388 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\hkkhhk.dll 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 2156 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 2156 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 484 wrote to memory of 2156 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 30 PID 484 wrote to memory of 2156 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 30 PID 484 wrote to memory of 2156 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 30 PID 484 wrote to memory of 2156 484 77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77e42cc75546ad9178782898f96c9aa1_JaffaCakes118.exe" TWO2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k hkkhhk1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD56e0f45c1a40839d6b1e1998a847d9fdc
SHA15d6a8d059a970df043353d0960c68fd93b7c68da
SHA256df37911cb9b9de0acbb5f538eb90a5c556a536d1c4d0bac4d1e29564db4be427
SHA51228a3b14ead0dd275f7c5dd8e3bb04622b8ab9498e620aeb907e7404cc36307466116beeb4d870b338555a26135e6947e2e8214b8c1a6740297acd454d4ccfc12