Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
-
Size
72KB
-
MD5
93ea420dfc3c8a501cc7174d67e30811
-
SHA1
e992f390f36192f3f33ed72f8bfa63a6bea1ce12
-
SHA256
0f1de3d728bf1bf76f1a2d6fd19d1989bb7f9c9aacf09fb36485edfb213f1e86
-
SHA512
95389448f792a50cb4a27a964242d563253e29eb23b302538a44becab01e52c52f877cf02cb0ff4d043ce603001c1b1ee7cbba308f714806415b30bc1ba21b68
-
SSDEEP
1536:ltWL1jM0upX5jWoXtNK8L5O/koxCsYa19s9wfz:ltQM0uF5jLX3w/k3sZmw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2868 svohcst.exe 2732 svohcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2680 cmd.exe 2680 cmd.exe 2868 svohcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" svohcst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2668 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 2676 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 2868 svohcst.exe 2732 svohcst.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohcst.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe 2732 svohcst.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2676 2668 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2676 2668 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2676 2668 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2676 2668 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2680 2676 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2680 2676 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2680 2676 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2680 2676 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2868 2680 cmd.exe 34 PID 2680 wrote to memory of 2868 2680 cmd.exe 34 PID 2680 wrote to memory of 2868 2680 cmd.exe 34 PID 2680 wrote to memory of 2868 2680 cmd.exe 34 PID 2868 wrote to memory of 2732 2868 svohcst.exe 35 PID 2868 wrote to memory of 2732 2868 svohcst.exe 35 PID 2868 wrote to memory of 2732 2868 svohcst.exe 35 PID 2868 wrote to memory of 2732 2868 svohcst.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\run.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exe"C:\Users\Admin\AppData\Local\Temp\svohcst.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD52f04a5a02717c3e2ad114b31bdd1f996
SHA1e271f85fe82daf308895548b74043bafbdc52d43
SHA25685a887268ccdb6d9b3b6f9446bee2a9b574d1ccbf46dd2c7a4d2897555c3e4bc
SHA512364cee7c4701afe4903c358f2b7f4e81a2a7f435e18d194874bcc639b76fedd39493b21f2692d8631a26ff4b838e1ee8172b25b013d49f075eca09afed640324
-
Filesize
72KB
MD593ea420dfc3c8a501cc7174d67e30811
SHA1e992f390f36192f3f33ed72f8bfa63a6bea1ce12
SHA2560f1de3d728bf1bf76f1a2d6fd19d1989bb7f9c9aacf09fb36485edfb213f1e86
SHA51295389448f792a50cb4a27a964242d563253e29eb23b302538a44becab01e52c52f877cf02cb0ff4d043ce603001c1b1ee7cbba308f714806415b30bc1ba21b68