Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 09:42
Behavioral task
behavioral1
Sample
89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe
-
Size
44KB
-
MD5
89e2dcf559e4bd9bc246d36c3d6f64fa
-
SHA1
07832794fe6c075e46a2215f759d83d8f764c98e
-
SHA256
f9cecfb6bb9b3db48b74635378d45159aa4e3ff72310475c16906e37cc50caad
-
SHA512
adbc09a0081cf2098a7869ad875ff69f50137332ea5167860edbdfa3c53a6a51e2140ad9d174d09b19e73eacc86414d74c06e07745de7f15c94309071bacbea8
-
SSDEEP
768:QmK5yGQVKTnf7RGur6CB3bWwUTTrzcTFXVd7/lZsomuRfCxRpV8zT07R1Y3:QprQAnWCc9TrzcTl/4ombRpWzT04
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosdate svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa = "C:\\Windows\\System32\\aaaaaaaa.exe" 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa = "C:\\Users\\Admin\\aaaaaaaa.exe" 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\aaaaaaaa.exe 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\SVCHOST.EXE 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2868 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 23 IoCs
pid Process 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 384 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 3 PID 2268 wrote to memory of 384 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 3 PID 2268 wrote to memory of 384 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 3 PID 2268 wrote to memory of 392 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 4 PID 2268 wrote to memory of 392 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 4 PID 2268 wrote to memory of 392 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 4 PID 2268 wrote to memory of 432 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 5 PID 2268 wrote to memory of 432 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 5 PID 2268 wrote to memory of 432 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 5 PID 2268 wrote to memory of 476 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 6 PID 2268 wrote to memory of 476 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 6 PID 2268 wrote to memory of 476 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 6 PID 2268 wrote to memory of 492 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 7 PID 2268 wrote to memory of 492 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 7 PID 2268 wrote to memory of 492 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 7 PID 2268 wrote to memory of 500 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 8 PID 2268 wrote to memory of 500 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 8 PID 2268 wrote to memory of 500 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 8 PID 2268 wrote to memory of 596 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 9 PID 2268 wrote to memory of 596 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 9 PID 2268 wrote to memory of 596 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 9 PID 2268 wrote to memory of 672 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 10 PID 2268 wrote to memory of 672 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 10 PID 2268 wrote to memory of 672 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 10 PID 2268 wrote to memory of 740 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 11 PID 2268 wrote to memory of 740 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 11 PID 2268 wrote to memory of 740 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 11 PID 2268 wrote to memory of 808 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 12 PID 2268 wrote to memory of 808 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 12 PID 2268 wrote to memory of 808 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 12 PID 2268 wrote to memory of 836 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 13 PID 2268 wrote to memory of 836 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 13 PID 2268 wrote to memory of 836 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 13 PID 2268 wrote to memory of 960 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 15 PID 2268 wrote to memory of 960 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 15 PID 2268 wrote to memory of 960 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 15 PID 2268 wrote to memory of 236 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 16 PID 2268 wrote to memory of 236 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 16 PID 2268 wrote to memory of 236 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 16 PID 2268 wrote to memory of 1032 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 17 PID 2268 wrote to memory of 1032 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 17 PID 2268 wrote to memory of 1032 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 17 PID 2268 wrote to memory of 1052 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 18 PID 2268 wrote to memory of 1052 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 18 PID 2268 wrote to memory of 1052 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 18 PID 2268 wrote to memory of 1104 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 19 PID 2268 wrote to memory of 1104 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 19 PID 2268 wrote to memory of 1104 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 19 PID 2268 wrote to memory of 1160 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 20 PID 2268 wrote to memory of 1160 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 20 PID 2268 wrote to memory of 1160 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 20 PID 2268 wrote to memory of 1180 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 21 PID 2268 wrote to memory of 1180 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 21 PID 2268 wrote to memory of 1180 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 21 PID 2268 wrote to memory of 1468 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 23 PID 2268 wrote to memory of 1468 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 23 PID 2268 wrote to memory of 1468 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 23 PID 2268 wrote to memory of 344 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 24 PID 2268 wrote to memory of 344 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 24 PID 2268 wrote to memory of 344 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 24 PID 2268 wrote to memory of 352 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 25 PID 2268 wrote to memory of 352 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 25 PID 2268 wrote to memory of 352 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 25 PID 2268 wrote to memory of 2944 2268 89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe 26
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1468
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:352
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:236
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1032
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2944
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2972
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89e2dcf559e4bd9bc246d36c3d6f64fa_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2868
-
-