Analysis
-
max time kernel
22s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe
-
Size
32KB
-
MD5
787f52de4348a353ac7a9bab77fedacd
-
SHA1
850eac2090ac2cc473a999eb770d562b00313214
-
SHA256
f02ca3c6408124741dcf7c28fd77924e2563c33f650042a5444e3cf2f3c4fcf6
-
SHA512
1ba1caf7d2a67c4ff8df018bf8296e535f7daebb46bca8d487e501563f29adf01f1e5cb0b4548ab865d57d644ec6342bdbdcd27bd4b2a121cda8512f8014b510
-
SSDEEP
768:coOjbhlc7sUoQnAz3ppOo0QJSHijv5js/wJJQ2M:1OPhlosUoAarDX1JJ7M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe Token: SeBackupPrivilege 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2976 3036 787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe 29 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2976 wrote to memory of 2744 2976 cmd.exe 31 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2744 wrote to memory of 2868 2744 cmd.exe 33 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2868 wrote to memory of 2884 2868 net.exe 34 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35 PID 2744 wrote to memory of 3000 2744 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\787f52de4348a353ac7a9bab77fedacd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dt.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K c:\windows\temp\r.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\ftp.exeftp -s:c:\windows\temp\f.txt4⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5676afdfa824e13b72aecaf6d0d65fa6c
SHA1f5e918c9fe29a9b432be38b812a6087f4a49bff2
SHA256896520460c090bcacba8cf6f633abf2e4c6e01c8284737b60b1f51063246e72a
SHA5124ac34dd1eb77862206dc608c9b57e2956857407b7c5eced45c20b6577e2d53755254fd38300a2b7d02624c37a652ade86add230cd33c452bec380688f414f633
-
Filesize
76B
MD5e492c90155bb26e6c57c202780f35093
SHA183d3d0a8af4fbcd3b70a22611578ef5b5966fcb9
SHA256ff07e608a348217c1306a1ff202f9b91fddf104b9367c4ee911bccefe04edb94
SHA512b3265b4f58966441813a0da9032d68e061dcbe6213f82b10f83addafe93627d66637105b443534fac8e074340ff50e07e14437309ad88befc774d2daf5286259
-
Filesize
164B
MD5f22ad73544c4463a4fe267ed2c646a20
SHA19faba5662a5f43fad4df2182fb3c45199cd316c8
SHA256188e171e17dad12fa1b8067a8b86bc113c0f9df9d9ef03e89006f9c3f7c51c98
SHA5122c52ceee850adbb90863452815d60596931c485c921ef1a7c3ed8d0de028cbbfc561d62e25beb63410e867da63ebfef6c7cf0f2d1cb75fe13e566731f4df2abd