Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe
-
Size
44KB
-
MD5
8b34d774a90db8edcb21428f5a0ad0e1
-
SHA1
6cf189cffc4737b3c7e376af98d6b556b0f14b17
-
SHA256
9f4f2b7a989de6d9069165c9074add98e248e30b99d7745a0f633c1495c06ded
-
SHA512
6889637bb56f09ab40fe7083c1aa97fd9569eb9a9dd09f1ef76b5925c53b59702a3c659faa7b338ac7604758e933491caea31835b3de6b6b32df9551edcd9e2e
-
SSDEEP
768:tMQoGBwklqKSf2+vblbO1M72eJ9AYLacN5xyLO93kcPCjG4F8x4XrYI+GJ:2tKvylbR7h9Znr/9u64fVJ
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kusn33sd\ImagePath = "C:\\Windows\\system32\\kusn33sd.exe -j" 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 kusn33sd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\KillMe.bat 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe File created C:\Windows\SysWOW64\kusn433sd3.dll kusn33sd.exe File created C:\Windows\SysWOW64\kusn33sd.exe 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kusn33sd.exe 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe File created C:\Windows\SysWOW64\kusn33sd.exe kusn33sd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kusn33sd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1688 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe 2356 kusn33sd.exe 2356 kusn33sd.exe 2356 kusn33sd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2536 1688 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2536 1688 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2536 1688 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2536 1688 8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b34d774a90db8edcb21428f5a0ad0e1_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KillMe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\kusn33sd.exeC:\Windows\SysWOW64\kusn33sd.exe -j1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD57487b9fd6a0a7c89bcc75e73eedece3d
SHA1ed21e843949001d7048138ad14b300a06110112d
SHA256979dd64c0911d5fcb4544a193b856c410d61b634427d7536dca49949ab092d4c
SHA5120f49735310b5b8dc502bd112d3ed7c662be54a51977eb5b011c11b6ff5ec1e9a79f401fb41763deebfa2223739b08d9ddeea4d5858ed1d4e0382453ebb3daf62
-
Filesize
44KB
MD58b34d774a90db8edcb21428f5a0ad0e1
SHA16cf189cffc4737b3c7e376af98d6b556b0f14b17
SHA2569f4f2b7a989de6d9069165c9074add98e248e30b99d7745a0f633c1495c06ded
SHA5126889637bb56f09ab40fe7083c1aa97fd9569eb9a9dd09f1ef76b5925c53b59702a3c659faa7b338ac7604758e933491caea31835b3de6b6b32df9551edcd9e2e