Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe
-
Size
691KB
-
MD5
87cf4b829639ea66dfaffc7aeab210da
-
SHA1
36207a964154f4c9f3a85180acf007e3a0429637
-
SHA256
62de229787a2daca9d16ea3d53a2601cd30e8c868050f0cb64f7bd4e48b53130
-
SHA512
027ef5d2664f75022e81f9e7fbf98d832cb19a03bc4ba9f23e5f866d38a80c0e8b8b629f10048d5de5619af2e93732be466fc6c03f575b5073a79e4122a92f60
-
SSDEEP
12288:KRxN0vaKaKsI2Azlklp7wsmk2r/Bszy9xXF3Z4mxxOIScEVnWIgmJ6CcjN:45KFsFVCr/UgRQmX1EWzmJ6t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1336 5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\C:\Windows\3600tray.exe 5.exe File opened for modification C:\Windows\C:\Windows\3600tray.exe 5.exe File created C:\Windows\uninstal.BAT 5.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Windows\C:\Windows\3600tray.exe 5.exe File opened for modification C:\Windows\C:\Windows\3600tray.exe 5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1336 2968 87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe 84 PID 2968 wrote to memory of 1336 2968 87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe 84 PID 2968 wrote to memory of 1336 2968 87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe 84 PID 1336 wrote to memory of 4360 1336 5.exe 88 PID 1336 wrote to memory of 4360 1336 5.exe 88 PID 1336 wrote to memory of 4360 1336 5.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87cf4b829639ea66dfaffc7aeab210da_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.BAT3⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792KB
MD59e0671568f3f6a465603634c4484abd3
SHA1a027bb37744e19304e8c7132db469e742d4c43c7
SHA256038f7ea22015a807c5e6fe69f57f55e8fe08569c31387e5ce32699c93dd3b225
SHA5123035130c24675ee884bbdaf31c7eab61711e2ddfa6713734a856f3d24e4ea9d2ec1fc4fd8732f1f75357ae8410b371c2aaf269db98086a12207b73f833289d06
-
Filesize
150B
MD55ce77c1059bc43f20a619ff52fb80e4e
SHA1531bf89d9330ef5f2af67bebb75cb27e3f92f03e
SHA256773ea78adb1df00ad3d56bd62dee9f1c067221cacdd60f8adb260fdbf7af6051
SHA5129d4c0013fe755398d8d66c2412fbe28be83a3866173f23b0f9ad36adf88aa4f62916c02b64fb985a2f11e8404c3ddf46ebee1f81b2cafdf215aa10cf6af5060f