Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe
-
Size
84KB
-
MD5
81f3c6e62a67615d4b4f196246e0690b
-
SHA1
3e19637ec5b24d2cd4a4e252bf97703bb511ce12
-
SHA256
784743d982944066364f64703c5525779926ba37f9b015617b3adcc5b138640e
-
SHA512
c254e178770b78770f99288a59efde71bfa8f13d4d03af9ce700bd7518ca8dee3f347e9ff45f97c2fe124d4c8f73e4a3d7adf328714852bdde067a61b64bf0e7
-
SSDEEP
768:/TTo4rv+FpfL1ggMnXvi/cf2Mx01BdXmCRSdMyTZnmzV6dgqsb18DghMr8+vV3Xb:/TTo7xJggMa/cf5x0DdWRJO82oBsTTo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\windows\\smss\\smss.exe" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 3436 smss.exe 3436 smss.exe 3436 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4600 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 85 PID 3736 wrote to memory of 4600 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 85 PID 3736 wrote to memory of 4600 3736 81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe 85 PID 4600 wrote to memory of 3436 4600 cmd.exe 87 PID 4600 wrote to memory of 3436 4600 cmd.exe 87 PID 4600 wrote to memory of 3436 4600 cmd.exe 87 PID 3436 wrote to memory of 3668 3436 smss.exe 89 PID 3436 wrote to memory of 3668 3436 smss.exe 89 PID 3436 wrote to memory of 3668 3436 smss.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81f3c6e62a67615d4b4f196246e0690b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\smss\smss.exe"c:\windows\smss\smss.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "smss" /d "c:\windows\smss\smss.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD5643e760c86826079f890e71df6d9e89c
SHA1485ba66bb65a656adb0e7ef089b75f947a592951
SHA2566474ab3df851411666fd089d1b28b2b8d19c1b5b56929f5a1298552d7b1488ff
SHA512fcf01628e3360c1b5aa8db6a2e567d3fc46a0f3a9549bd154dab6ad3c50404dd4de412dab026b1fb7d68f0fd78d0c0912422c9a701c6fee5d5b472ed366b7b2b