Analysis
-
max time kernel
97s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe
-
Size
296KB
-
MD5
0375b0df33088538f56ffec11c13abd2
-
SHA1
b3f39510a57b3931eab3073b2ea5af3cb2533b29
-
SHA256
6eaecaef38da2386d64f8a9f5c7a84795bb0681b895307bec3996d2345f7b4c6
-
SHA512
5b0a83b97086553f19f9151504762d338f2c98ec9c018c1cba11c1967ee30e0031243e2e439f56c3886ee6a6fc7c1c713836dbaa1d32efc747f55d7f54fbe160
-
SSDEEP
6144:wSh2C/MvQsNB+vZtw3v4lX4lD9yBqqlpBzA/cbzWhe:gIqIZtwwsDof+e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 700 set thread context of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 700 wrote to memory of 3124 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 83 PID 700 wrote to memory of 3124 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 83 PID 700 wrote to memory of 3124 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 83 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 700 wrote to memory of 1772 700 0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe 84 PID 3124 wrote to memory of 4380 3124 cmd.exe 86 PID 3124 wrote to memory of 4380 3124 cmd.exe 86 PID 3124 wrote to memory of 4380 3124 cmd.exe 86 PID 4380 wrote to memory of 4924 4380 net.exe 87 PID 4380 wrote to memory of 4924 4380 net.exe 87 PID 4380 wrote to memory of 4924 4380 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0375b0df33088538f56ffec11c13abd2_JaffaCakes118.exe2⤵
- Executes dropped EXE
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD50375b0df33088538f56ffec11c13abd2
SHA1b3f39510a57b3931eab3073b2ea5af3cb2533b29
SHA2566eaecaef38da2386d64f8a9f5c7a84795bb0681b895307bec3996d2345f7b4c6
SHA5125b0a83b97086553f19f9151504762d338f2c98ec9c018c1cba11c1967ee30e0031243e2e439f56c3886ee6a6fc7c1c713836dbaa1d32efc747f55d7f54fbe160