Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe
-
Size
453KB
-
MD5
787832c005650d26c76d14739cbba3b9
-
SHA1
c651d4a65977b7b7250f2b764ad15fca6094f61b
-
SHA256
604e07cc049b2e85c2a06136337b612f67bd6e48c3b8c62515aa0c739a0475b2
-
SHA512
9df78e383814926bc3dea93e7ca626548ffbe3976795761c51d6537139144698a55ea7b7c3be8bdae315d642046486d52aaa99de7a52475527b5251ac5b558f3
-
SSDEEP
12288:fpmG5hK/jALOg4+ZbtnENlRxp8BDmV1Mk:RmY0/Rg46btnENl2DmH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2288 dM01831HdJdL01831.exe -
Executes dropped EXE 1 IoCs
pid Process 2288 dM01831HdJdL01831.exe -
Loads dropped DLL 2 IoCs
pid Process 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2328-2-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2328-19-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2328-18-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2288-30-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2288-39-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dM01831HdJdL01831 = "C:\\ProgramData\\dM01831HdJdL01831\\dM01831HdJdL01831.exe" dM01831HdJdL01831.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dM01831HdJdL01831.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main dM01831HdJdL01831.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe Token: SeDebugPrivilege 2288 dM01831HdJdL01831.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 dM01831HdJdL01831.exe 2288 dM01831HdJdL01831.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2288 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2288 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2288 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2288 2328 787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\ProgramData\dM01831HdJdL01831\dM01831HdJdL01831.exe"C:\ProgramData\dM01831HdJdL01831\dM01831HdJdL01831.exe" "C:\Users\Admin\AppData\Local\Temp\787832c005650d26c76d14739cbba3b9_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD59a19addf4cb698249d21894e88ecbf7e
SHA1c4294c4483ca5f22bada498e7bf1dedd7e54cf02
SHA256cbd1177166688b5596a948e447d25da32a62368dec0a6cee8efb1e3e00c09ef4
SHA51274e4d5636396aa1113330c4d42055d0a70fbf6b6480fc2619fe5dadedc0e451278796ddec984fa05bfd096dcf4c6a4fe6e4382975e22b4fd5ed809b49949d066
-
Filesize
453KB
MD57f555be8662b62f2f131bf2f1258400c
SHA1d8797373cc6fbcdf64b56b0663887c112a4e0843
SHA256c445e15244f85acd7b97f95b6aea561b58b29e13deaa11e64246003a5302b7b3
SHA5129aef17e1e55491c8f526d7df151edbd34c421f8bdd5202182c575184369dc70dea3df1f5f06fe9dc401efb6c61b16caf5ea8207d98fff4b8ce57bc665e04b1ef