Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe
-
Size
489KB
-
MD5
785c608c1b13155ecf6ee9e4e655a217
-
SHA1
d31d940ffc0fcca86489ed2bffc61ad7aaf2a712
-
SHA256
09a0df4265ab25ff561a3cec1dbe6fa3dab812b5fd08ff679de5376ae31daa30
-
SHA512
fc090be86db39c53c956f41e9e97bbc0336d7ed286cfa3f06ad2d9c5cc3549aa540ed9552a3df5e15f344bf051e95be65f664af1051f85729313b2e313c1bd09
-
SSDEEP
3072:dHuMOcSChBy3XP6GT50YkcD+0EHQgYgNUeTcOcRU69fH9cEl3:dHicSChoXt3i0EH9Umvufnl
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\594CYAUY0P85 = "C:\\Users\\Admin\\AppData\\Roaming\\AYBM55KE.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\594CYAUY0P85 = "C:\\Users\\Admin\\AppData\\Roaming\\AYBM55KE.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2832-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-14-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-18-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-15-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2832-22-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\594CYAUY0P85 = "C:\\Users\\Admin\\AppData\\Roaming\\AYBM55KE.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\mortalkr.exe\"" 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\594CYAUY0P85 = "C:\\Users\\Admin\\AppData\\Roaming\\AYBM55KE.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 svchost.exe 2832 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2832 2700 785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\785c608c1b13155ecf6ee9e4e655a217_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52c16ef011bcc28c622d4d0b969f5abc3
SHA1d267d7f1467d45e3cba6388437d444816742b721
SHA256aa6a46a102fec7aa0fca5060c6ea7d5eb6b6f4278117c95f02ce5148a1960a0d
SHA5121424d6f1f4313d0a63c5a8dd269f666782d922a07538bf15033c83d793b57c0221bf691bdf90d52e149077eadef09b2a1d70dbd0408b0325f9613299d3b9e979