Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe
-
Size
365KB
-
MD5
81c569ca3895c3b311ee72e33f0a32f4
-
SHA1
39a0f67b7e30c9824d1849bfb5408a5f85ec9d64
-
SHA256
ce907810fb3d27d78c07b7b925694a2cfd2aa75df2fe0e36ce67f9fcad9cc3cd
-
SHA512
5afdb025bdffaee0fab71daf7f178d853d5efab0a37021dbe708caec784f4847739bd2a0649c0b003c741a8712872c49d19a995fb5b9715dbfdab5f7fb5550bb
-
SSDEEP
6144:5Av08fABi4r2ijnDZtZ1OD909gKILteB9rmCXIOBKHAAMb:QRAwzijDJC9y6S3R
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" 4GGXXTHS.exe -
resource yara_rule behavioral1/memory/3008-2-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2684-9-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\4GGXXTHS 4GGXXTHS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4GGXXTHS.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main 4GGXXTHS.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" 4GGXXTHS.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2684 4GGXXTHS.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe 2684 4GGXXTHS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2684 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2684 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2684 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2684 3008 81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c569ca3895c3b311ee72e33f0a32f4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\PROGRA~3\4GGXXTHS.exeC:\PROGRA~3\4GGXXTHS.exe2⤵
- Manipulates Digital Signatures
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2684
-