Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe
-
Size
267KB
-
MD5
84601698ea183273d0c0a0153a3f3039
-
SHA1
60df8c5f24cfa14b41aebb4038a2d22e8181b5f5
-
SHA256
4e4a22ba8bcdfe1119c1250aa734860c3f2b55ef768bb9737ed9852df42dc8a5
-
SHA512
c830b573a57d96bc72b89ef3e96a921862fb9a6b9aae62e69ea7ecc51ed84e0071c5ce680d74496d7a8ac0926bbb7f67a389a72a75d38077a1f9350546fbabd0
-
SSDEEP
6144:KxZaXTfCraCZREa9PzhNOdyfxSKHKvG4Qsq/HI:KVhEghBfxSKHKemq/HI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4268 lqWdPuJVnwzm3.exe -
Executes dropped EXE 2 IoCs
pid Process 4500 lqWdPuJVnwzm3.exe 4268 lqWdPuJVnwzm3.exe -
Loads dropped DLL 4 IoCs
pid Process 3600 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 3600 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 4268 lqWdPuJVnwzm3.exe 4268 lqWdPuJVnwzm3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MtKbOnPXyO = "C:\\ProgramData\\jdGTaTWa\\lqWdPuJVnwzm3.exe" 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4736 set thread context of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 4500 set thread context of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4268 set thread context of 4996 4268 lqWdPuJVnwzm3.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqWdPuJVnwzm3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqWdPuJVnwzm3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 4736 wrote to memory of 3600 4736 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 84 PID 3600 wrote to memory of 4500 3600 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 88 PID 3600 wrote to memory of 4500 3600 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 88 PID 3600 wrote to memory of 4500 3600 84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe 88 PID 4500 wrote to memory of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4500 wrote to memory of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4500 wrote to memory of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4500 wrote to memory of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4500 wrote to memory of 4268 4500 lqWdPuJVnwzm3.exe 89 PID 4268 wrote to memory of 4996 4268 lqWdPuJVnwzm3.exe 90 PID 4268 wrote to memory of 4996 4268 lqWdPuJVnwzm3.exe 90 PID 4268 wrote to memory of 4996 4268 lqWdPuJVnwzm3.exe 90 PID 4268 wrote to memory of 4996 4268 lqWdPuJVnwzm3.exe 90 PID 4268 wrote to memory of 4996 4268 lqWdPuJVnwzm3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84601698ea183273d0c0a0153a3f3039_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"C:\ProgramData\jdGTaTWa\lqWdPuJVnwzm3.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe"C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe" /i:42685⤵PID:4996
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD584601698ea183273d0c0a0153a3f3039
SHA160df8c5f24cfa14b41aebb4038a2d22e8181b5f5
SHA2564e4a22ba8bcdfe1119c1250aa734860c3f2b55ef768bb9737ed9852df42dc8a5
SHA512c830b573a57d96bc72b89ef3e96a921862fb9a6b9aae62e69ea7ecc51ed84e0071c5ce680d74496d7a8ac0926bbb7f67a389a72a75d38077a1f9350546fbabd0