Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe
-
Size
280KB
-
MD5
78e4ed5e85d5f4c7200cb939e06061ac
-
SHA1
e2026d588f8fc11e74903b29d1e38050414db0ea
-
SHA256
bd5fbb75da23c0cf516eb4e90c29fb68511ac3ab3e300f721b0ae34121f63414
-
SHA512
3182a29b5d6d7c02791960e2b15fa6f75590d6b207343f7056362038ce5a4ab5468137c68d1f787934e17b92f69b770ee80719020f9f715100298cb20349dfc7
-
SSDEEP
3072:GGNhsmuLF9w8Vg8JVwl27xEYUfWHg5422Njjcvf4EnP8chkSGf2rLEu/LM/Jzjo:GGfc9w8Vg8JVY422NjIigrLEu
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\code.dll 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe File created C:\Windows\SysWOW64\yxxxx.CLL 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3628 cmd.exe 5040 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5040 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3628 2388 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe 92 PID 2388 wrote to memory of 3628 2388 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe 92 PID 2388 wrote to memory of 3628 2388 78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe 92 PID 3628 wrote to memory of 5040 3628 cmd.exe 94 PID 3628 wrote to memory of 5040 3628 cmd.exe 94 PID 3628 wrote to memory of 5040 3628 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\cd.bat&echo del "C:\Users\Admin\AppData\Local\Temp\78e4ed5e85d5f4c7200cb939e06061ac_JaffaCakes118.exe">>c:\cd.bat&echo del c:\cd.bat>>c:\cd.bat&c:\cd.bat2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50bbe24d142f8bc1a0306dc608e70daf3
SHA1da1e0fa05fee8f110e4a2fcbd00feb7995d643ea
SHA256d9decf5c9d2ed1aa18bfc17fba4ae2e9dc997bf8820041279815214261700185
SHA512b772b96264c26cd3494e6886bd0a2d5d49bbb09d584fe23cb8c9d9c3f9d7542528cd1376bbdc92ec0fa24a1e829ac5b104b986fa40f52df38863c41da77150b6
-
Filesize
125B
MD5880627af3dea2abaf2447b14b3816571
SHA1b2e2cf030af8e984c74dc9de1dda55bce62a5a7f
SHA256534bf62a015d3249030a4121e9e876cde40d54c22e17528accb7c57d7f02fedf
SHA5120f957faafbad111c5e9dc3aa562866269d1e915011f3d0bc23908387f7ea8beae69d2800207cd0306b4ed87dd58aa1be13010b3d614c3fccbdfae8c220c9e83b