Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe
-
Size
125KB
-
MD5
04654d2d595db4b36bc1186f0e56a947
-
SHA1
d9a1b88a645e732eac58f5e866b121fb9bc5f588
-
SHA256
ee06f14a3b346b7516368d69f2fbdac12622aaf24d01526c13932f6e4e2e1da5
-
SHA512
450ed1a99bedd38387dfad68eb00997fb140fd0b65f5b0c4cecfc1bf98cbc3bce96c05732eaa6f26dc159d3b5cc0b152a1578512833716f44a4009b1a7193d45
-
SSDEEP
3072:L6pO5MNL3J8uqmAxOxRqDrbt3hgMUDQ0L5P2B:O8G13JpqfxqKXgnF2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\lsass.exe" reg.exe -
resource yara_rule behavioral1/memory/2028-1-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2028-3-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Hide Artifacts: Hidden Files and Directories 1 TTPs 4 IoCs
pid Process 2140 cmd.exe 2696 cmd.exe 2832 cmd.exe 2876 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2752 cmd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2216 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2216 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2216 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2216 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 30 PID 2028 wrote to memory of 2544 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 32 PID 2028 wrote to memory of 2544 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 32 PID 2028 wrote to memory of 2544 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 32 PID 2028 wrote to memory of 2544 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 32 PID 2028 wrote to memory of 2140 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2140 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2140 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2140 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2696 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2696 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2696 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2696 2028 04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe 36 PID 2544 wrote to memory of 2228 2544 cmd.exe 38 PID 2544 wrote to memory of 2228 2544 cmd.exe 38 PID 2544 wrote to memory of 2228 2544 cmd.exe 38 PID 2544 wrote to memory of 2228 2544 cmd.exe 38 PID 2216 wrote to memory of 2752 2216 cmd.exe 39 PID 2216 wrote to memory of 2752 2216 cmd.exe 39 PID 2216 wrote to memory of 2752 2216 cmd.exe 39 PID 2216 wrote to memory of 2752 2216 cmd.exe 39 PID 2140 wrote to memory of 2832 2140 cmd.exe 40 PID 2140 wrote to memory of 2832 2140 cmd.exe 40 PID 2140 wrote to memory of 2832 2140 cmd.exe 40 PID 2140 wrote to memory of 2832 2140 cmd.exe 40 PID 2228 wrote to memory of 2848 2228 cmd.exe 41 PID 2228 wrote to memory of 2848 2228 cmd.exe 41 PID 2228 wrote to memory of 2848 2228 cmd.exe 41 PID 2228 wrote to memory of 2848 2228 cmd.exe 41 PID 2832 wrote to memory of 2860 2832 cmd.exe 42 PID 2832 wrote to memory of 2860 2832 cmd.exe 42 PID 2832 wrote to memory of 2860 2832 cmd.exe 42 PID 2832 wrote to memory of 2860 2832 cmd.exe 42 PID 2696 wrote to memory of 2876 2696 cmd.exe 43 PID 2696 wrote to memory of 2876 2696 cmd.exe 43 PID 2696 wrote to memory of 2876 2696 cmd.exe 43 PID 2696 wrote to memory of 2876 2696 cmd.exe 43 PID 2876 wrote to memory of 2836 2876 cmd.exe 44 PID 2876 wrote to memory of 2836 2876 cmd.exe 44 PID 2876 wrote to memory of 2836 2876 cmd.exe 44 PID 2876 wrote to memory of 2836 2876 cmd.exe 44 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2860 attrib.exe 2836 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\04654d2d595db4b36bc1186f0e56a947_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\lsass.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2836
-
-
-