Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe
-
Size
168KB
-
MD5
8e4be2eb83b42225b500ca568d023e9a
-
SHA1
8ea1f7cd198e9d6c6567444fffd1f0af0f1753f3
-
SHA256
8235712093c3d4d8e6ace925ce65654bb6d68673cfcfb8f3808f40b67bbdf65d
-
SHA512
c809d76695b8aad93e6785af453d13ae8ad6f19af175efd134685538c41cab069c8b92ee1b3a210fe31efea067639e68f1a925527cdbd4fedfdb1069eb33c2b3
-
SSDEEP
3072:5v9cbTFhDHGrwpfwtTsZVQ3zY54tyeh8ZtkEqXJzRzaLrt:5Fcbhhb3p8TAQ3zY54tpqZtkEqZc
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 964 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2712 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Domain Groups 1 TTPs
Attempt to find domain-level groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exenet1.exenet1.exenet.exesc.execmd.exenet.exenet.execmd.execmd.exenet1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exepid process 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exenet.exenet.execmd.execmd.exenet.exedescription pid process target process PID 2688 wrote to memory of 2752 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2752 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2752 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2752 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2752 wrote to memory of 2928 2752 net.exe net1.exe PID 2752 wrote to memory of 2928 2752 net.exe net1.exe PID 2752 wrote to memory of 2928 2752 net.exe net1.exe PID 2752 wrote to memory of 2928 2752 net.exe net1.exe PID 2688 wrote to memory of 2056 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2056 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2056 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2688 wrote to memory of 2056 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe net.exe PID 2056 wrote to memory of 1128 2056 net.exe net1.exe PID 2056 wrote to memory of 1128 2056 net.exe net1.exe PID 2056 wrote to memory of 1128 2056 net.exe net1.exe PID 2056 wrote to memory of 1128 2056 net.exe net1.exe PID 2688 wrote to memory of 2808 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2808 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2808 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2808 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2804 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2804 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2804 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 2804 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2808 wrote to memory of 2564 2808 cmd.exe net.exe PID 2808 wrote to memory of 2564 2808 cmd.exe net.exe PID 2808 wrote to memory of 2564 2808 cmd.exe net.exe PID 2808 wrote to memory of 2564 2808 cmd.exe net.exe PID 2804 wrote to memory of 2712 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2712 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2712 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2712 2804 cmd.exe sc.exe PID 2564 wrote to memory of 2588 2564 net.exe net1.exe PID 2564 wrote to memory of 2588 2564 net.exe net1.exe PID 2564 wrote to memory of 2588 2564 net.exe net1.exe PID 2564 wrote to memory of 2588 2564 net.exe net1.exe PID 2688 wrote to memory of 964 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 964 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 964 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe PID 2688 wrote to memory of 964 2688 8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e4be2eb83b42225b500ca568d023e9a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net.exenet group /domain2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group /domain3⤵
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\net.exenet group /domain2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group /domain3⤵
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C net.exe stop foundation2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net.exenet.exe stop foundation3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop foundation4⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete foundation2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\sc.exesc delete foundation3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8E4BE2~1.EXE >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:964