Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe
-
Size
5KB
-
MD5
8b3ed28dcb1de8c770d3483cfe1916db
-
SHA1
782afbbd6b01ae59e189a8756f4d9d7ca37dcef1
-
SHA256
18e5dff6f6651775902b497d538f2005ff2a5585620a438cbd7a56b53511626f
-
SHA512
9be75022d3cf0de282606994eda3955ffbd28cb3e44ab071aec4261f3ad208f3343315bd6d3550065a56fb7de78642a8f3909de7f6e6405a87768d7af9367609
-
SSDEEP
96:w3QKy+w4HNi1cl/E1ejMPbsIqW4AaApNu3vWzoiRaajpL4fd89BFu9V1aTamW:nwl/E1ejVIR3aAN7zLRaU4+FuMamW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1304 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 292 lsacs.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lsacs.exe 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe File created C:\Windows\SysWOW64\lsacs.exe 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 292 lsacs.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1716 wrote to memory of 292 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 28 PID 1716 wrote to memory of 292 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 28 PID 1716 wrote to memory of 292 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 28 PID 1716 wrote to memory of 292 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 28 PID 292 wrote to memory of 1204 292 lsacs.exe 21 PID 1716 wrote to memory of 1304 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 29 PID 1716 wrote to memory of 1304 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 29 PID 1716 wrote to memory of 1304 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 29 PID 1716 wrote to memory of 1304 1716 8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b3ed28dcb1de8c770d3483cfe1916db_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\lsacs.exeC:\Windows\system32\lsacs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:292
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelUS.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD55fee8788a4e575fad26742527708cba6
SHA1450352015ea021c7d2cc4eb30cae0b287c545ab8
SHA256abde8e458b797b847cbca18365fb9da4c52f5eb227cbf3beefa0cb9b120a5d71
SHA5126035c9b8dbda1ebef7596b642a6769f9eff2a74452e2476ce8df649601fe4dffe748dbd711d75c8f9bc69bc0cdf901a4be6acbc609fbeab48a52bbd909d01181
-
Filesize
5KB
MD58b3ed28dcb1de8c770d3483cfe1916db
SHA1782afbbd6b01ae59e189a8756f4d9d7ca37dcef1
SHA25618e5dff6f6651775902b497d538f2005ff2a5585620a438cbd7a56b53511626f
SHA5129be75022d3cf0de282606994eda3955ffbd28cb3e44ab071aec4261f3ad208f3343315bd6d3550065a56fb7de78642a8f3909de7f6e6405a87768d7af9367609