Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe
-
Size
646KB
-
MD5
95472eb880fe3ff07c11da64cca4fbdd
-
SHA1
231a4cb1944998766034aec22e8ff59b0785cffd
-
SHA256
6843d4b9450198bd0dade53bdc1c582f31ea4356eb4c2b6d3b3bf83945620165
-
SHA512
1854a7fdb4eae9c24808b6f20970f9f167ef995bda9fb93a3d3c8f2f31dbb874713959b6c8de03c9907734295d7fbf6ee8571fa0789dc26a866ce53b85fcd15e
-
SSDEEP
12288:7HvZp31Yx9NCBIKxzlrKxSnOam3/Ypy1c2obY7BI3KLwd0JW:7hp29KxztORdocLwdZ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4580 3.exe 1256 G_Server2.03.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\HgzServer\G_Server2.03.exe 3.exe File created C:\Program Files (x86)\HgzServer\G_Server2.03.exe 3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\DELME.BAT 3.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G_Server2.03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4580 3.exe Token: SeDebugPrivilege 1256 G_Server2.03.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 G_Server2.03.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4580 5044 95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe 85 PID 5044 wrote to memory of 4580 5044 95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe 85 PID 5044 wrote to memory of 4580 5044 95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe 85 PID 1256 wrote to memory of 232 1256 G_Server2.03.exe 89 PID 1256 wrote to memory of 232 1256 G_Server2.03.exe 89 PID 4580 wrote to memory of 1044 4580 3.exe 94 PID 4580 wrote to memory of 1044 4580 3.exe 94 PID 4580 wrote to memory of 1044 4580 3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95472eb880fe3ff07c11da64cca4fbdd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT3⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
C:\Program Files (x86)\HgzServer\G_Server2.03.exe"C:\Program Files (x86)\HgzServer\G_Server2.03.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD52748d6c0dc61ce20af1f78645127d3a6
SHA15dae8d3cb7011fea45c974f39863dc7906b07134
SHA256a774893e087c4580e58f373b585b65a4df1c71e5c85cf85578fc454010d302a8
SHA51208f8bccf9f467a4bae6321f51926b114d7f51afc53609c4d30e6ec93fb65f2d544a4f277615c9500bf30d68c1022c39cde6c2b46b21f076d53b1636bdaba126f
-
Filesize
150B
MD567e4ea2c3e65d3236c8266b9c116f67f
SHA17e87f925ccd68b2b7c9af9f92e118db1990234f9
SHA2562dff6c390d03870cec06d16fe0191475fb87ad2330b78d03c15e7ff0bed8f00c
SHA5121a3cf0443e932b9b57f32531b3d61c917b9eec19a4ba73336011041e16a0022c5e62b2c768b34a0bdc08ffd75bbaa0338719577001496c9de8a5638420b0a229