Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe
-
Size
281KB
-
MD5
824b23711bbb4133e3bbb2379397f72b
-
SHA1
d28ea4c1b8630c6c367c4dfed9e782c778bb9d78
-
SHA256
43e5457fb74bd1f7e2a79eb949519cfe8019fc55e7b57cebc81d89bc9cf9d2be
-
SHA512
1fe6a72e63fa2e19202f2a4dea2ba85e60b6c08498dc3b02ec8f41cf534ae21b4e87aebfdbebb93b1355d6478dc32ae72b2b9ded581db2ba66c4f542932056e1
-
SSDEEP
6144:imQ8Ufw/M/eUfTWOP9uo51oe1jfohAjLdO9E1vO/hD3lMZBperIh+8:cw/lUb7oeCovO/ZVMZBpec
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 svohst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat svohst.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3648 2700 svohst.exe 87 PID 2700 wrote to memory of 3648 2700 svohst.exe 87 PID 2700 wrote to memory of 3648 2700 svohst.exe 87 PID 464 wrote to memory of 2068 464 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe 89 PID 464 wrote to memory of 2068 464 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe 89 PID 464 wrote to memory of 2068 464 824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\824b23711bbb4133e3bbb2379397f72b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:3648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104B
MD52eec7e3ae21b6acc8fb8cf0a2f7323aa
SHA10e6a8a87b7c2848ffec860a6955a44a2c166ad9b
SHA25678d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2
SHA512e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281
-
Filesize
212B
MD53c9257327eed407c9b293308aa576bae
SHA1325e3ac915b4fc0bb3bacb12933d89023b4be073
SHA256200714c5a0632cc8f3337c408a4f633ba8214fd7e31e014933c4aefe001d597d
SHA512085521046869111b77bdfccf83e13971f8d9e125b62847d8400627331c2e89bd2c507b6499e7dd6a5b2526530c496dd610956b0cba0ca3ea2485fba3c447d266
-
Filesize
281KB
MD5824b23711bbb4133e3bbb2379397f72b
SHA1d28ea4c1b8630c6c367c4dfed9e782c778bb9d78
SHA25643e5457fb74bd1f7e2a79eb949519cfe8019fc55e7b57cebc81d89bc9cf9d2be
SHA5121fe6a72e63fa2e19202f2a4dea2ba85e60b6c08498dc3b02ec8f41cf534ae21b4e87aebfdbebb93b1355d6478dc32ae72b2b9ded581db2ba66c4f542932056e1