Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe
-
Size
35KB
-
MD5
94619c824c2079a51e4c1f1003121493
-
SHA1
0482b80d52ad2768eef5e25eef38b5736480e3f9
-
SHA256
840314d4b2d64e0682c572d8724e95af3444dec1e8c8c553ec7b8836a3be02e6
-
SHA512
39d1b5e7344affde52f5fc1f687e79bf22e44cf466d0fefdcbd5337bddec097e7fd2acf80d70c46df12c7a8feccb1a46567425ba1c77cdba4e16300f59b13723
-
SSDEEP
384:x9RlQG13BLgexxxaR0O834rfmAT/5bcicoAVmaqsj7T0oY7cQ67oJk1Ziwf6hycM:TQGpmes+olciha/sw8cF6srxLwN97jO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2800 BCSSync.exe 2404 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 2800 BCSSync.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2480 set thread context of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2800 set thread context of 2404 2800 BCSSync.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 2800 BCSSync.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2352 2480 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2800 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2800 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2800 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2800 2352 94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe 31 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2800 wrote to memory of 2404 2800 BCSSync.exe 32 PID 2404 wrote to memory of 2584 2404 BCSSync.exe 33 PID 2404 wrote to memory of 2584 2404 BCSSync.exe 33 PID 2404 wrote to memory of 2584 2404 BCSSync.exe 33 PID 2404 wrote to memory of 2584 2404 BCSSync.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\94619c824c2079a51e4c1f1003121493_JaffaCakes118.exe5⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD56d1a8c4940224a70d938810f9c0e7880
SHA1d0e9f67c010ef7cfa1add33ae2815520637fe4dd
SHA25646e8f36cc0da05cbd6245594de5d211da7e699cbc21a2f2a35207e5e6bcccb45
SHA51262dccb362c4d6c83d63d07eb2ceb95464b12624bbda920d95bdc20b4b73db5944a373a11c78d828ca9c53f0c4632ddcec7ffe18c98dea246c039c0e444b93444