Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe
-
Size
218KB
-
MD5
890e36b60da9343f77a3d7e5a1e60516
-
SHA1
07561bc621f9a2c4e2ba8d7c58d8444b8c8b5737
-
SHA256
03d8ee4d9958ad70ff66da334cf0fee831102c34648862ed3fe9b82a25af14aa
-
SHA512
c0614e3c45738dc01662245ee855420d4c983cd7c0eba3bdab93f43a09d19d5edc88ac8770c025f54d25dc641d4e8ff03f054e006110a2a1de879f6cfd686afe
-
SSDEEP
3072:+cPCtLvtaX/8wzVN1ZdOdXvPy0IiK4fit8sUTNwkklt99WJ5jO:+cMLYX/8whre1bIl38sUTNPkVUn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe 2352 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\intnet.bmp 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\intnet.bmp 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Kills process with taskkill 1 IoCs
pid Process 2484 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe 2352 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2484 taskkill.exe Token: SeBackupPrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeRestorePrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeBackupPrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeRestorePrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeBackupPrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeRestorePrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeBackupPrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe Token: SeRestorePrivilege 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2484 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe 86 PID 4996 wrote to memory of 2484 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe 86 PID 4996 wrote to memory of 2484 4996 890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\890e36b60da9343f77a3d7e5a1e60516_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im zrIvF2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD523003b043d9e1bcfd9018530bffc7ebe
SHA142facd1899e7151bc3fc76621213866a915d9a28
SHA2561857f7abe9a8f8a549230fe2cde5d81734bee0c63e5dfcaafd45db3c32ccb176
SHA512e7f187218b4f1d5c1002aba01642d37f1cb358d38a5f7272f7c49743e87b05045e20380214323c05d5adf890277a4f3c3b4b26cba039016c53361820f133cbe5
-
Filesize
98B
MD53c49c6527f3acb53e791d34644ca3188
SHA146f0860e0bfed74d0b63a9f1096232d0c473b75a
SHA256ee6b908b1cfc36857b4a7efc4283cadde975703e5f8ed2e9f0b0186b8fad94b1
SHA512be4edc73bc1b300129acedfa4341963dd1bfda7bf1e92c41af8c03f938f500272553c5929b39e54664db79f2d5d7b4904e5b80c78609ba8d2ffb1c7ffb2b0bad
-
Filesize
726KB
MD59ec8ea1f8f32f8ad0bdb91cdfc1d4207
SHA1114f25677df9c2fad63a3d2d91986ae1f90044c7
SHA25601639382a6985f70468ff8b62c90434d21c5b4dd22549a5a18a2f1e9cafc0a0e
SHA5127fec42636f14137a7309495a41799cbb43fa74654762dced67e5298400604917094939af999f7cfe2cb97096179dd45c2c196f3be0345f9870aad863c4137a14