Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:55
Behavioral task
behavioral1
Sample
95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe
-
Size
38KB
-
MD5
95cdeffd369387dab772bf2a797783b8
-
SHA1
c2ea95c172f3747a43876cac892ba838ea948baf
-
SHA256
7a0f0a0a76596809f0645c4b53d657eba257fe139b4c09cbb2fc9e67c83aac08
-
SHA512
d2a02a6198020628177c6811fa66e09a38628dace434a5c7371f468698d84c7f304189858a9823f9f02342293ec73e5e173b25f67496f84402f915de1b1fbe18
-
SSDEEP
768:t4gvVrqnanuCu9zKKD6jRW2iNpThmslL5/bVaNOowJy2:zdroquCI+hwpThdTENJ72
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1040 drtuahehjh.exe -
resource yara_rule behavioral2/memory/4940-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x0009000000023463-6.dat upx behavioral2/memory/4940-13-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1040-19-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\drtuahehjh = "C:\\Windows\\drtuahehjh.exe" 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\drtuahehjh.exe 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe File opened for modification C:\Windows\drtuahehjh.exe 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1000 sc.exe 4428 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drtuahehjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 1040 drtuahehjh.exe 1040 drtuahehjh.exe 1040 drtuahehjh.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4940 wrote to memory of 1040 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 84 PID 4940 wrote to memory of 1040 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 84 PID 4940 wrote to memory of 1040 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 84 PID 4940 wrote to memory of 2552 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 86 PID 4940 wrote to memory of 2552 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 86 PID 4940 wrote to memory of 2552 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 86 PID 4940 wrote to memory of 1000 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 87 PID 4940 wrote to memory of 1000 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 87 PID 4940 wrote to memory of 1000 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 87 PID 4940 wrote to memory of 3844 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 88 PID 4940 wrote to memory of 3844 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 88 PID 4940 wrote to memory of 3844 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 88 PID 4940 wrote to memory of 4428 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 90 PID 4940 wrote to memory of 4428 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 90 PID 4940 wrote to memory of 4428 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 90 PID 4940 wrote to memory of 2296 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 92 PID 4940 wrote to memory of 2296 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 92 PID 4940 wrote to memory of 2296 4940 95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe 92 PID 3844 wrote to memory of 4272 3844 net.exe 96 PID 3844 wrote to memory of 4272 3844 net.exe 96 PID 3844 wrote to memory of 4272 3844 net.exe 96 PID 2552 wrote to memory of 712 2552 net.exe 97 PID 2552 wrote to memory of 712 2552 net.exe 97 PID 2552 wrote to memory of 712 2552 net.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95cdeffd369387dab772bf2a797783b8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\drtuahehjh.exeC:\Windows\drtuahehjh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:712
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\drtuahehjh108.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD595cdeffd369387dab772bf2a797783b8
SHA1c2ea95c172f3747a43876cac892ba838ea948baf
SHA2567a0f0a0a76596809f0645c4b53d657eba257fe139b4c09cbb2fc9e67c83aac08
SHA512d2a02a6198020628177c6811fa66e09a38628dace434a5c7371f468698d84c7f304189858a9823f9f02342293ec73e5e173b25f67496f84402f915de1b1fbe18
-
Filesize
218B
MD56496650eccdd95bdce0355b58bf5b376
SHA13b5e3e335297965e9811cfb6ed8ac225be8f67ee
SHA25620ef91a2979e9e35fba52405594126b61f902d7b7f5c5dc2c2beb4c87aaa62ce
SHA51290ca177436acd77619a2b7fa9b72d06b1c888878da0ce8be8c4cf63ee349c7606e7cc32145794abfbfa1b9a57835329c1b6333d20702f4ed4d05c00feb966d3d