Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 00:53
Behavioral task
behavioral1
Sample
8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe
-
Size
14KB
-
MD5
8cad39d2077cd33226ebbf8b20c76c68
-
SHA1
3e296377d19ef74f94d138fcc6f5f70f67cf93c5
-
SHA256
585372630b477009a4d5aac892dd537b7e30e05fb41157feb91a5723d2985b75
-
SHA512
804e3af952b6d2eb969c696041a8c71cf555b1bf4fc1b4320b844bed624e4491dfcd52795c426b914b20bc85e26b03d0af2e8fad95bd4197e181159163f68ffb
-
SSDEEP
192:pAE9r8Kvx5eRJR8qqZR4FyptQE9V+BWXx2L0hj4C6yXwYE985FJ3xJdcCt:KEuEwf5qZR4FyUE9VpthhOAF9pt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2200 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 bzski.exe -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000700000001211a-3.dat upx behavioral1/memory/1800-4-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/3068-5-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1800-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\bzski.exe 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bzski.exe 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzski.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3068 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2200 3068 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2200 3068 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2200 3068 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2200 3068 8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cad39d2077cd33226ebbf8b20c76c68_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8CAD39~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\bzski.exeC:\Windows\SysWOW64\bzski.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD58cad39d2077cd33226ebbf8b20c76c68
SHA13e296377d19ef74f94d138fcc6f5f70f67cf93c5
SHA256585372630b477009a4d5aac892dd537b7e30e05fb41157feb91a5723d2985b75
SHA512804e3af952b6d2eb969c696041a8c71cf555b1bf4fc1b4320b844bed624e4491dfcd52795c426b914b20bc85e26b03d0af2e8fad95bd4197e181159163f68ffb