Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe
-
Size
112KB
-
MD5
8905f1ba417e516eb9914c69bdf58f85
-
SHA1
d058e0991a61c079af126b63377fd096600ed586
-
SHA256
2e095d8e5252fc017b50f63c0bb688babadb5f61ba21049c1f13d4f23b1c6c6b
-
SHA512
e5bec651c1bd15fee6b4ea93f3a6482070dded758a2ae801527d1919ec06119e820bccbabb67027ed4043c0ae33a252b208c5edb6b64835e44c617ef8af003ab
-
SSDEEP
1536:y4AOQD5zDzLt7K/cWbC2+1pqrz7SaX451pBZhuWaGS7Ti272eGQlL4tRMWd7tXUl:0977gL4tRMWJtkXvUgzPGxHHI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2324 service.exe 3028 service.exe -
Loads dropped DLL 3 IoCs
pid Process 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 2324 service.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Corpo = "C:\\Users\\Admin\\AppData\\Roaming\\service.exe" service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2488 set thread context of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2324 set thread context of 3028 2324 service.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 2324 service.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2088 2488 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2324 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2324 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2324 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 31 PID 2088 wrote to memory of 2324 2088 8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe 31 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32 PID 2324 wrote to memory of 3028 2324 service.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\8905f1ba417e516eb9914c69bdf58f85_JaffaCakes118.exe
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\service.exe
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD58905f1ba417e516eb9914c69bdf58f85
SHA1d058e0991a61c079af126b63377fd096600ed586
SHA2562e095d8e5252fc017b50f63c0bb688babadb5f61ba21049c1f13d4f23b1c6c6b
SHA512e5bec651c1bd15fee6b4ea93f3a6482070dded758a2ae801527d1919ec06119e820bccbabb67027ed4043c0ae33a252b208c5edb6b64835e44c617ef8af003ab