Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe
-
Size
100KB
-
MD5
822b132b37e13c79f5ac4d96ff437f76
-
SHA1
ba4517619c5b1cfb627f0317c46e7c18adcc08af
-
SHA256
128fdfc6a6b120686456b7f566e429b8ec22403d89e2519433b6c3026e2e28e0
-
SHA512
d78de9f51402d39441cefbbfa120e41fd981c62569f3f4a10a32cc9cfcd5d0167daa5fc642208c7f4b6fe784019fe88a7443843a8cba2cc6e784cadfb7927edd
-
SSDEEP
3072:QRDKNDKjf6qmg2QMRSgyD1SQzIswoY1AD:QRuNDK76XwM0pMQzIjy
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2716 svs.exe 2816 svs.exe 2108 svs.exe 2704 svs.exe 1956 svs.exe 1672 svs.exe 1376 svs.exe 2448 svs.exe 1748 svs.exe 952 svs.exe -
Loads dropped DLL 20 IoCs
pid Process 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 2716 svs.exe 2716 svs.exe 2816 svs.exe 2816 svs.exe 2108 svs.exe 2108 svs.exe 2704 svs.exe 2704 svs.exe 1956 svs.exe 1956 svs.exe 1672 svs.exe 1672 svs.exe 1376 svs.exe 1376 svs.exe 2448 svs.exe 2448 svs.exe 1748 svs.exe 1748 svs.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File opened for modification C:\Windows\SysWOW64\svs.exe 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe File created C:\Windows\SysWOW64\svs.exe svs.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svs.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2716 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2716 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2716 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 31 PID 2208 wrote to memory of 2716 2208 822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe 31 PID 2716 wrote to memory of 2816 2716 svs.exe 32 PID 2716 wrote to memory of 2816 2716 svs.exe 32 PID 2716 wrote to memory of 2816 2716 svs.exe 32 PID 2716 wrote to memory of 2816 2716 svs.exe 32 PID 2816 wrote to memory of 2108 2816 svs.exe 34 PID 2816 wrote to memory of 2108 2816 svs.exe 34 PID 2816 wrote to memory of 2108 2816 svs.exe 34 PID 2816 wrote to memory of 2108 2816 svs.exe 34 PID 2108 wrote to memory of 2704 2108 svs.exe 35 PID 2108 wrote to memory of 2704 2108 svs.exe 35 PID 2108 wrote to memory of 2704 2108 svs.exe 35 PID 2108 wrote to memory of 2704 2108 svs.exe 35 PID 2704 wrote to memory of 1956 2704 svs.exe 36 PID 2704 wrote to memory of 1956 2704 svs.exe 36 PID 2704 wrote to memory of 1956 2704 svs.exe 36 PID 2704 wrote to memory of 1956 2704 svs.exe 36 PID 1956 wrote to memory of 1672 1956 svs.exe 37 PID 1956 wrote to memory of 1672 1956 svs.exe 37 PID 1956 wrote to memory of 1672 1956 svs.exe 37 PID 1956 wrote to memory of 1672 1956 svs.exe 37 PID 1672 wrote to memory of 1376 1672 svs.exe 38 PID 1672 wrote to memory of 1376 1672 svs.exe 38 PID 1672 wrote to memory of 1376 1672 svs.exe 38 PID 1672 wrote to memory of 1376 1672 svs.exe 38 PID 1376 wrote to memory of 2448 1376 svs.exe 39 PID 1376 wrote to memory of 2448 1376 svs.exe 39 PID 1376 wrote to memory of 2448 1376 svs.exe 39 PID 1376 wrote to memory of 2448 1376 svs.exe 39 PID 2448 wrote to memory of 1748 2448 svs.exe 40 PID 2448 wrote to memory of 1748 2448 svs.exe 40 PID 2448 wrote to memory of 1748 2448 svs.exe 40 PID 2448 wrote to memory of 1748 2448 svs.exe 40 PID 1748 wrote to memory of 952 1748 svs.exe 41 PID 1748 wrote to memory of 952 1748 svs.exe 41 PID 1748 wrote to memory of 952 1748 svs.exe 41 PID 1748 wrote to memory of 952 1748 svs.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 472 "C:\Users\Admin\AppData\Local\Temp\822b132b37e13c79f5ac4d96ff437f76_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 528 "C:\Windows\SysWOW64\svs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 532 "C:\Windows\SysWOW64\svs.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 552 "C:\Windows\SysWOW64\svs.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 536 "C:\Windows\SysWOW64\svs.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 540 "C:\Windows\SysWOW64\svs.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 548 "C:\Windows\SysWOW64\svs.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 544 "C:\Windows\SysWOW64\svs.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 556 "C:\Windows\SysWOW64\svs.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\svs.exeC:\Windows\system32\svs.exe 568 "C:\Windows\SysWOW64\svs.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:952
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5822b132b37e13c79f5ac4d96ff437f76
SHA1ba4517619c5b1cfb627f0317c46e7c18adcc08af
SHA256128fdfc6a6b120686456b7f566e429b8ec22403d89e2519433b6c3026e2e28e0
SHA512d78de9f51402d39441cefbbfa120e41fd981c62569f3f4a10a32cc9cfcd5d0167daa5fc642208c7f4b6fe784019fe88a7443843a8cba2cc6e784cadfb7927edd