Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
8efbc7722bf8484c2aa4c9f0e69aa5c0
-
SHA1
a01271cbc63aee455e2829dc9aa5810ddacc7161
-
SHA256
dc673d9e5057c91373ee2a26ba7e1b363ba1071d07c4d6fa85c610b07568f436
-
SHA512
7919898b3b1d0484aa1f6305ffc1b3debe33782638509b9bc2bdbe6b4428ea01442ad309999995eb358be0d5df6bd5ec8eebe57220e8dfdb2b19f9bd2df290df
-
SSDEEP
24576:VHOdSYZkkEviIyPvS8rSWWivqg+BYLjAG6sTjjBVuL9Qcq2VJGXJopw+ruYJ4mdC:JNujjBVoragxnT57mwQ9n
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2756 explorer.exe 780 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 2756 explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2756 set thread context of 780 2756 explorer.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 780 explorer.exe 780 explorer.exe 780 explorer.exe 780 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 2756 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2820 2380 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 30 PID 2820 wrote to memory of 2756 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 31 PID 2820 wrote to memory of 2756 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 31 PID 2820 wrote to memory of 2756 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 31 PID 2820 wrote to memory of 2756 2820 8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe 31 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 2756 wrote to memory of 780 2756 explorer.exe 32 PID 780 wrote to memory of 548 780 explorer.exe 33 PID 780 wrote to memory of 548 780 explorer.exe 33 PID 780 wrote to memory of 548 780 explorer.exe 33 PID 780 wrote to memory of 548 780 explorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8efbc7722bf8484c2aa4c9f0e69aa5c0_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" 13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe" 14⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\28365.bat"5⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD520a1521427e5cb4b0ebb33e03b76bc0e
SHA1fc6fa1fc22498780172634e13ddc782cad5b73cc
SHA25670273bc47d4e82026ba6b068cf473e29b3442b8c38b2cffb575aff35c2414660
SHA51287c7d4985898d1381aeb961b0090247a6c39b29ed61fa130b2b64eb9d8af41d3a5aeec5e6c935d08711723e258306daf238a43a012ad8ed0b790181998f7c62b
-
Filesize
16B
MD50f29ccdcc81b9de9e83cb54ef404a25f
SHA1ece86cd2c0dcb7cedea44bafbd750efbb1b6050a
SHA256f5a8455b57751e1b83a55517c15d32686fdf7893122d3f2ab5d1d67e10aca9f3
SHA51211dc65469438d2bfab36500b412031b7f7140f8a08e6aae7052496b635691feb5d75a66b4ea089dc78be8ba3fcb3e0666a8e2340811f7f136101112a197f822d
-
Filesize
16B
MD5148b389d77fb259ed4888efd75c439d4
SHA17e592c3aef88898975ca3a137c6c90c609b2e3b4
SHA256ce96bde80d0f8b067eed2120a85c5659ddd8889e8358c934e6d01f7e138ff61e
SHA51280a9d901fa501333a23b80066e14cd8937af7b72a8ff4b621e09dda34510429d61c81a1d41e3701a7c661669e7b479c5a012350edaa1628c9be43b48f94297d6
-
Filesize
16B
MD57899e885fcba3115bcc862b03b6b4f78
SHA17aa6c0ed58a8f6809a6264b768dbbdfcb6269f61
SHA2562966f80d6744e706d509dbf00c47f300917ab84a359e308d8a26b3a01a99fa2e
SHA5123c1123b2e9b714634405fee9e9fabc1baa11e8adf343462605e30c22ba527efb03557fdc172532d2d1873da7d8ecfdae1719a45c0d81805d2dabb22605741af8
-
Filesize
16B
MD5ee5c64d7757148e83b837b3868b640e9
SHA16b74108d10aebc70d3309f710132f2ce8d32a3ba
SHA2569f25270b0eb81fa4660844cc051e486ea09b4ff2cb445d8abf7ae2988023eae5
SHA512002797a6c317dccf6ae6ea478a64362efe990557afe27415957b5f3cecf5f077513b634b4d60cc64c35d5df2f93df113df3e2c83771c806edfb24bbe33ae8d59
-
Filesize
16B
MD56af9c8fc09f80098ada68310bca5a378
SHA1876305c11d75b0eb258029436d9fe45d50d168d8
SHA2568c438bdb1907a64e7478f1c7a2bd5096832bb0b89fe0c01b1e3751edac8aadad
SHA512038ddb8c17a464ffb84685d888b8a5239dd997e8500c85881d8b5c456f6eadf42f5c4be23ecfb97c9fcab2b62398f5f1cd27fbe53c73f61eda6aef6d4254ee5f
-
Filesize
16B
MD55f39fd389f12ae05d2cb577270532a8c
SHA1839ae15791de5e023e0249db3b77c2fb039678c1
SHA2560a343526084531b4719f6bc192e7d6293ff80df2d999d60c34f9cf05800f27a8
SHA5123371547d1cde8c8856daf524e58a441349be7cf61c3bb17d3a2c867fbede2d923ac7dd1fc37e912216c955432c3a428d947dc402ae76cf0d9da40e611d494a95
-
Filesize
16B
MD5d6ddda24b1dfccc8cacbf1b2a0d271b2
SHA104949cdf06204c1aed69c856c17d36c1c101a057
SHA2567a5198e48a34fcc3d6da61e0b476427e62053841b7cfbce2dedbbfb32793123c
SHA512b6717a08fa282bfd9d0e2e2e74e514254ea886d5cb362b064ca54b55fc45a9da834f6adbb21afd18b6ec0561ef8815d0f58f7042467c8ec6616b73b36f797173
-
Filesize
2.8MB
MD58efbc7722bf8484c2aa4c9f0e69aa5c0
SHA1a01271cbc63aee455e2829dc9aa5810ddacc7161
SHA256dc673d9e5057c91373ee2a26ba7e1b363ba1071d07c4d6fa85c610b07568f436
SHA5127919898b3b1d0484aa1f6305ffc1b3debe33782638509b9bc2bdbe6b4428ea01442ad309999995eb358be0d5df6bd5ec8eebe57220e8dfdb2b19f9bd2df290df