Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe
-
Size
148KB
-
MD5
8cf5c7624252c403dcfcf2d2d8e252e7
-
SHA1
c542f67c7927de5406e1c70c59466e06ee61c638
-
SHA256
c84a71b1bccba9cf519b78f6a51e4a47c7095741c329cfc886338b0c4553bb16
-
SHA512
e41ecc0bc1a49d5127e22319bb70abe4732e37336debc6d6a79c7d34ce0e7dd9b2d89c1debd1a3e06803c39d2a6b3bbf388e8e0df8140ced3dfaa78982d99f86
-
SSDEEP
3072:DHNJfdFMeHw41WhR5btEzv3GCTyjHI/yIsHUprgIAL:DHPYH02fHI/y5S8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\startAPI = "c:\\system32\\SYSTERN2.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HAHAHA = "c:\\system32\\SYSTERN2.bat" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\startAPI = "c:\\windows\\hartlell.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HAHAHA = "c:\\windows\\hartlell.bat" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WINDOWsAPI = "c:\\windows\\wimn32.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\CONTROLexit = "c:\\windows\\wimn32.bat" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\startAPI = "c:\\windows\\SYSTERN.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HAHAHA = "c:\\windows\\SYSTERN.bat" reg.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: format.com File opened (read-only) \??\E: format.com -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\SYSTERN.bat cmd.exe File created \??\c:\windows\hartlell.bat cmd.exe File opened for modification \??\c:\windows\hartlell.bat cmd.exe File created \??\c:\windows\wimn32.bat cmd.exe File opened for modification \??\c:\windows\wimn32.bat cmd.exe File created \??\c:\windows\SYSTERN.bat cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language format.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language format.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier format.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier format.com -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2660 ipconfig.exe 1932 ipconfig.exe 3024 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 2760 shutdown.exe Token: SeRemoteShutdownPrivilege 2760 shutdown.exe Token: SeBackupPrivilege 2640 format.com -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2712 2824 8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2712 2824 8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2712 2824 8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2712 2824 8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe 31 PID 2712 wrote to memory of 2748 2712 cmd.exe 32 PID 2712 wrote to memory of 2748 2712 cmd.exe 32 PID 2712 wrote to memory of 2748 2712 cmd.exe 32 PID 2712 wrote to memory of 2748 2712 cmd.exe 32 PID 2712 wrote to memory of 2348 2712 cmd.exe 33 PID 2712 wrote to memory of 2348 2712 cmd.exe 33 PID 2712 wrote to memory of 2348 2712 cmd.exe 33 PID 2712 wrote to memory of 2348 2712 cmd.exe 33 PID 2712 wrote to memory of 2780 2712 cmd.exe 34 PID 2712 wrote to memory of 2780 2712 cmd.exe 34 PID 2712 wrote to memory of 2780 2712 cmd.exe 34 PID 2712 wrote to memory of 2780 2712 cmd.exe 34 PID 2712 wrote to memory of 2840 2712 cmd.exe 35 PID 2712 wrote to memory of 2840 2712 cmd.exe 35 PID 2712 wrote to memory of 2840 2712 cmd.exe 35 PID 2712 wrote to memory of 2840 2712 cmd.exe 35 PID 2712 wrote to memory of 2752 2712 cmd.exe 36 PID 2712 wrote to memory of 2752 2712 cmd.exe 36 PID 2712 wrote to memory of 2752 2712 cmd.exe 36 PID 2712 wrote to memory of 2752 2712 cmd.exe 36 PID 2712 wrote to memory of 2844 2712 cmd.exe 37 PID 2712 wrote to memory of 2844 2712 cmd.exe 37 PID 2712 wrote to memory of 2844 2712 cmd.exe 37 PID 2712 wrote to memory of 2844 2712 cmd.exe 37 PID 2712 wrote to memory of 2700 2712 cmd.exe 38 PID 2712 wrote to memory of 2700 2712 cmd.exe 38 PID 2712 wrote to memory of 2700 2712 cmd.exe 38 PID 2712 wrote to memory of 2700 2712 cmd.exe 38 PID 2712 wrote to memory of 2644 2712 cmd.exe 39 PID 2712 wrote to memory of 2644 2712 cmd.exe 39 PID 2712 wrote to memory of 2644 2712 cmd.exe 39 PID 2712 wrote to memory of 2644 2712 cmd.exe 39 PID 2712 wrote to memory of 2760 2712 cmd.exe 40 PID 2712 wrote to memory of 2760 2712 cmd.exe 40 PID 2712 wrote to memory of 2760 2712 cmd.exe 40 PID 2712 wrote to memory of 2760 2712 cmd.exe 40 PID 2712 wrote to memory of 2660 2712 cmd.exe 42 PID 2712 wrote to memory of 2660 2712 cmd.exe 42 PID 2712 wrote to memory of 2660 2712 cmd.exe 42 PID 2712 wrote to memory of 2660 2712 cmd.exe 42 PID 2712 wrote to memory of 1932 2712 cmd.exe 43 PID 2712 wrote to memory of 1932 2712 cmd.exe 43 PID 2712 wrote to memory of 1932 2712 cmd.exe 43 PID 2712 wrote to memory of 1932 2712 cmd.exe 43 PID 2712 wrote to memory of 3024 2712 cmd.exe 44 PID 2712 wrote to memory of 3024 2712 cmd.exe 44 PID 2712 wrote to memory of 3024 2712 cmd.exe 44 PID 2712 wrote to memory of 3024 2712 cmd.exe 44 PID 2712 wrote to memory of 2640 2712 cmd.exe 45 PID 2712 wrote to memory of 2640 2712 cmd.exe 45 PID 2712 wrote to memory of 2640 2712 cmd.exe 45 PID 2712 wrote to memory of 2640 2712 cmd.exe 45 PID 2712 wrote to memory of 2604 2712 cmd.exe 46 PID 2712 wrote to memory of 2604 2712 cmd.exe 46 PID 2712 wrote to memory of 2604 2712 cmd.exe 46 PID 2712 wrote to memory of 2604 2712 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt8080.bat "C:\Users\Admin\AppData\Local\Temp\8cf5c7624252c403dcfcf2d2d8e252e7_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\reg.exereg add hkey_local_machine\software\microsoft\windows\currentversion\run /v startAPI /t reg_sz /d c:\windows\hartlell.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_current_user\software\microsoft\windows\currentversion\run /v HAHAHA /t reg_sz /d c:\windows\hartlell.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_local_machine\software\microsoft\windows\currentversion\run /v WINDOWsAPI /t reg_sz /d c:\windows\wimn32.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_current_user\software\microsoft\windows\currentversion\run /v CONTROLexit /t reg_sz /d c:\windows\wimn32.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_local_machine\software\microsoft\windows\currentversion\run /v startAPI /t reg_sz /d c:\windows\SYSTERN.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_current_user\software\microsoft\windows\currentversion\run /v HAHAHA /t reg_sz /d c:\windows\SYSTERN.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_local_machine\software\microsoft\windows\currentversion\run /v startAPI /t reg_sz /d c:\system32\SYSTERN2.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\reg.exereg add hkey_current_user\software\microsoft\windows\currentversion\run /v HAHAHA /t reg_sz /d c:\system32\SYSTERN2.bat /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -f -t 120 -c "s'a t'apprendra"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2660
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1932
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3024
-
-
C:\Windows\SysWOW64\format.comformat F: /q /y3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\format.comformat E: /q /y3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2604
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1944
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e588adddfb9ca36278074b7a0070ebce
SHA17ddb1e6e592d5ff6a0bca1383f17958279d4e1c6
SHA25664238d3ca58410ccf29a7a3593c16e4790782fda851f8c5075122cd09ef002ce
SHA5128717b223047d5da923a0ddb1dbf50951c5404a7d2a224000d1282ba2441e705e734a5a5dfb7c7c485e6b9f6415e5bfc04de019753218c61472ec0d3a6630a35f