Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:19
Behavioral task
behavioral1
Sample
88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/Keygen.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$TEMP/Keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/svchost.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/svchost.exe
Resource
win10v2004-20240802-en
General
-
Target
88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe
-
Size
135KB
-
MD5
88420113af3853846fe8915b5d0fc75f
-
SHA1
7c38abddb79a2cc35bab069cbfcf6d16fc9b9eeb
-
SHA256
cc74da59ac86b951ed556f5f2ce5e9da4eb61c21f11209cf043a0d29bef69876
-
SHA512
b72e5d95b0e153064ed5483330ebfa6edaacf3bc2d769feb62cc9abcc52f9dd02e2844440be7382057d214699b00539f1d8aed6e0f09eb79c0188941956f9b6f
-
SSDEEP
3072:S9kcc/OJTMw6Rgo5SBzLpqpBhQRHVegXIDzZwt7Q:S9k1/S4wN6SlFqbu1eFDzCt7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2224 svchost.exe 2352 Keygen.exe -
Loads dropped DLL 10 IoCs
pid Process 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 2224 svchost.exe 2224 svchost.exe 2224 svchost.exe 2352 Keygen.exe 2352 Keygen.exe 2352 Keygen.exe -
resource yara_rule behavioral1/files/0x000a000000012286-3.dat upx behavioral1/files/0x00080000000162e3-29.dat upx behavioral1/memory/2352-21-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2224-13-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2352-109-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2968-110-0x0000000000940000-0x000000000096C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2372 2224 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2224 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2224 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2968 wrote to memory of 2352 2968 88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32 PID 2224 wrote to memory of 2372 2224 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88420113af3853846fe8915b5d0fc75f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 3923⤵
- Program crash
PID:2372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Keygen.exeC:\Users\Admin\AppData\Local\Temp\Keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ba132df9edc0a6a68fde0eda7250d30e
SHA14bbfdfb26711d1b747a23a012dd661238ca3c082
SHA2565f41354e53c9aa4c85ee567aa17f3aeb25563dc87f308c83ddfa5e7cdca7bdca
SHA5125d08bb742263244071e3f68c56d90989c9f16800c525c8aa923377373da985fd3d32e7b6ed5716e0a458429784bd2ecacb7ac92dd9a761ae7e33e6b75c330ae6
-
Filesize
16KB
MD59b578fd26c3fbe4b720c9ab2e3556924
SHA17e4395344a02ffa469bac8cbbd82ccd1d7f5f7ba
SHA2561fb4df7d07ed8e55b10da166f28dd493a08ff6cf43ef5ca56693e252c4369deb
SHA512dca17c52d9d76d51e11b819e7ac09de12a823415a8bb7fae32d101cc86516c4da3c07aa863181d490e33e5b43668f1b986f6d22840c12d21d60882cb942e7b25
-
Filesize
56KB
MD5e1d300e107fdf1d777e2f6f99fe438d2
SHA182ede37d811b55cd50cdf3f50b4e16e3d529d6ab
SHA2567a6a67678f6c6df657aabef24a48577ce0b8197a05e16468ce01a01b70d38722
SHA51259541b8e07eedbe79a1ade7befd8ee1dc966998848d96518133060e50b7ae96dedd24d79e23da802d17d83a281424ce4f1b6d332a6a2d7368123a0924bcf05a1