Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe
-
Size
275KB
-
MD5
8b28c9b6dfbcce668bb6ee4a71983646
-
SHA1
191dd719e835498823dd8b727f1a1b4ed5b2bf1e
-
SHA256
a2f67d00ba7b533cc039f3bb534550d780ca4c1880de624e7c57bb18a2cbd8fb
-
SHA512
29320b4485cf80fd380ed1889d9c2ca216970b448ac6230fd2ee5a639d18306e09a372d3c070406a70260837550186e2b80249789afdacee1273dd25935bbe26
-
SSDEEP
6144:XxSJ40WsKJFAGLAfSfdmo21SfXzqf3ygpbR1t1hl:Q40WgGsfKmszWyC17h
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 system.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system.exe 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe File created C:\Windows\uninstal.bat 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe File created C:\Windows\system.exe 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe Token: SeDebugPrivilege 2224 system.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 system.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2188 2224 system.exe 31 PID 2224 wrote to memory of 2188 2224 system.exe 31 PID 2224 wrote to memory of 2188 2224 system.exe 31 PID 2224 wrote to memory of 2188 2224 system.exe 31 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2408 2676 8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b28c9b6dfbcce668bb6ee4a71983646_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\system.exeC:\Windows\system.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD58b28c9b6dfbcce668bb6ee4a71983646
SHA1191dd719e835498823dd8b727f1a1b4ed5b2bf1e
SHA256a2f67d00ba7b533cc039f3bb534550d780ca4c1880de624e7c57bb18a2cbd8fb
SHA51229320b4485cf80fd380ed1889d9c2ca216970b448ac6230fd2ee5a639d18306e09a372d3c070406a70260837550186e2b80249789afdacee1273dd25935bbe26
-
Filesize
218B
MD517ef193ca435fb8b30bf90e4ebd973ae
SHA1f1be3eda175e36862e6ed93700cbafe63beb7f76
SHA25656c5a7809376f0eb7427807f6eb3e1535211e3c6da35ed60cf54caa8eabdcd7a
SHA512d7c96f33a3e134c53882323066022f4fc119bd306e91d41883f343762093f35ecb68ee272f52a2b24acbad3953243b9d4c943f56cc1ba8cf79b371e5ddcefcb6