Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe
-
Size
396KB
-
MD5
8ed2eb1ff4c6f23f7cc98bde8f7dfb2f
-
SHA1
08e4c972b4ed763c286568964cfa832f9a79353f
-
SHA256
fd8811843f5441e26fbbc2949c741db0598272ef14dfc8b291b266d81c5ea707
-
SHA512
92dbe2f7e676dba41d1c5a2d5ab6dd0b7c6c819ddaa2bc06e92cfa23d47a9e5e4ba8fa4490fb9e062dce0aa00cd183c87b0124afee88ae72d6c8397d6b6bab23
-
SSDEEP
12288:cQK5yBpzBA7G49OI7e7njeQPxmblesUyE:FK5yTB8sIy7njeQpmBnUn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 umnafpe.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 cmd.exe 2020 cmd.exe 2780 umnafpe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umnafpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2020 cmd.exe 2332 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 2412 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2332 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe 2780 umnafpe.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2020 2564 8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2020 2564 8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2020 2564 8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2020 2564 8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2412 2020 cmd.exe 33 PID 2020 wrote to memory of 2412 2020 cmd.exe 33 PID 2020 wrote to memory of 2412 2020 cmd.exe 33 PID 2020 wrote to memory of 2412 2020 cmd.exe 33 PID 2020 wrote to memory of 2332 2020 cmd.exe 35 PID 2020 wrote to memory of 2332 2020 cmd.exe 35 PID 2020 wrote to memory of 2332 2020 cmd.exe 35 PID 2020 wrote to memory of 2332 2020 cmd.exe 35 PID 2020 wrote to memory of 2780 2020 cmd.exe 36 PID 2020 wrote to memory of 2780 2020 cmd.exe 36 PID 2020 wrote to memory of 2780 2020 cmd.exe 36 PID 2020 wrote to memory of 2780 2020 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2564 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8ed2eb1ff4c6f23f7cc98bde8f7dfb2f_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\umnafpe.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 25643⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2332
-
-
C:\Users\Admin\AppData\Local\umnafpe.exeC:\Users\Admin\AppData\Local\umnafpe.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD58ed2eb1ff4c6f23f7cc98bde8f7dfb2f
SHA108e4c972b4ed763c286568964cfa832f9a79353f
SHA256fd8811843f5441e26fbbc2949c741db0598272ef14dfc8b291b266d81c5ea707
SHA51292dbe2f7e676dba41d1c5a2d5ab6dd0b7c6c819ddaa2bc06e92cfa23d47a9e5e4ba8fa4490fb9e062dce0aa00cd183c87b0124afee88ae72d6c8397d6b6bab23