Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe
-
Size
204KB
-
MD5
8b951b798f8a988cf7ceba7cab8e5b80
-
SHA1
8e74a0cd88f4ecc99d7eb66e2e1bfc5bba3e13a8
-
SHA256
8d36ef1f332deebcc4ee12bb3e99709c3f137d01bf1701a04d7aa9f0fe5b1d58
-
SHA512
d50096e36d9787f314473ae5e397dec1e2edc153be2b42dc426c7d4b3536d32059d06240fd174e79aa0d1fbc0b050e731a529f8931dc9e0ae289ec4cc7569590
-
SSDEEP
6144:rveY2TNgrT9xrb4KgGiB7z/a9Qrtgq7Kfca:rkhAT9xn4KgGiB7bS8tzu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\123fb9e0 = "ú=\rë\x12\x05B™”ú¢pgûm]…e«iˆÈŠ™ÜÕÝU\x1c>£IK›öqß\x0f\x16\x7fYùs\x16qÁ±±i\r\x0f%NÁ‘a“ñÙÓ/þ\x0f\x19«fN,\x03Ïqƾ»ñ¬‡¦¾´-cIá«\x19[,þçýM鎛¯Ááua+i‰î\t\t¹÷á™Y©‘—lQ±¹)ž\\[\u00ad\x7fæÆ=6³fy´¼Ö\x0fS±¡ùï—ƒk\x03áÄSÑ\x14íÏT{\u0081\x01k‡Ñî;¶Î/IC\x17Ù†í¾£—\u008f>u[\x06›!«»{á†Ö©)Tƾ¶1†\x16¤sí\x17Cu\x14Ñ}ÃѹÙÙ\x03~N\v‰\x1dþ\x17ž–ìö>CÝtóÙcÄáã‰\x15\x13á©\\\x17ä›5í\tE'eN%tž1;«G\u009d«Uá\x1d!Þ" 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Token: SeSecurityPrivilege 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe Token: SeSecurityPrivilege 2412 svchost.exe Token: SeSecurityPrivilege 2412 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2412 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b951b798f8a988cf7ceba7cab8e5b80_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\33Z3WL1E\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
204KB
MD5d810f7e5623f0437d9557daf331ac66d
SHA152bd6feeab6a8df8472e0be0305d85cdf1740d59
SHA25625bb3d7092bd77d22ca385485b2afb63e47b75957ec55f53322c007d07c58743
SHA51287f163a51a9b1e1c7974a44541c660904ea1866fc74b1024a534f81c622b163780fbd761e7f614b3662fa0fd289ecd10c02e949664b323133f743246a42e5206