Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe
-
Size
72KB
-
MD5
93ea420dfc3c8a501cc7174d67e30811
-
SHA1
e992f390f36192f3f33ed72f8bfa63a6bea1ce12
-
SHA256
0f1de3d728bf1bf76f1a2d6fd19d1989bb7f9c9aacf09fb36485edfb213f1e86
-
SHA512
95389448f792a50cb4a27a964242d563253e29eb23b302538a44becab01e52c52f877cf02cb0ff4d043ce603001c1b1ee7cbba308f714806415b30bc1ba21b68
-
SSDEEP
1536:ltWL1jM0upX5jWoXtNK8L5O/koxCsYa19s9wfz:ltQM0uF5jLX3w/k3sZmw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1376 svohcst.exe 1096 svohcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" svohcst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 976 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 4480 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 1376 svohcst.exe 1096 svohcst.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohcst.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe 1096 svohcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 976 wrote to memory of 4480 976 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 84 PID 976 wrote to memory of 4480 976 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 84 PID 976 wrote to memory of 4480 976 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 84 PID 4480 wrote to memory of 692 4480 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 86 PID 4480 wrote to memory of 692 4480 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 86 PID 4480 wrote to memory of 692 4480 93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe 86 PID 692 wrote to memory of 1376 692 cmd.exe 89 PID 692 wrote to memory of 1376 692 cmd.exe 89 PID 692 wrote to memory of 1376 692 cmd.exe 89 PID 1376 wrote to memory of 1096 1376 svohcst.exe 90 PID 1376 wrote to memory of 1096 1376 svohcst.exe 90 PID 1376 wrote to memory of 1096 1376 svohcst.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\93ea420dfc3c8a501cc7174d67e30811_JaffaCakes118.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\run.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exe"C:\Users\Admin\AppData\Local\Temp\svohcst.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD52f04a5a02717c3e2ad114b31bdd1f996
SHA1e271f85fe82daf308895548b74043bafbdc52d43
SHA25685a887268ccdb6d9b3b6f9446bee2a9b574d1ccbf46dd2c7a4d2897555c3e4bc
SHA512364cee7c4701afe4903c358f2b7f4e81a2a7f435e18d194874bcc639b76fedd39493b21f2692d8631a26ff4b838e1ee8172b25b013d49f075eca09afed640324
-
Filesize
72KB
MD593ea420dfc3c8a501cc7174d67e30811
SHA1e992f390f36192f3f33ed72f8bfa63a6bea1ce12
SHA2560f1de3d728bf1bf76f1a2d6fd19d1989bb7f9c9aacf09fb36485edfb213f1e86
SHA51295389448f792a50cb4a27a964242d563253e29eb23b302538a44becab01e52c52f877cf02cb0ff4d043ce603001c1b1ee7cbba308f714806415b30bc1ba21b68