Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe
-
Size
706KB
-
MD5
9653809fac7b3b612f49d26a99e4bf5a
-
SHA1
b848e0ac13dbf2ea1b60b776b47b9260453694e1
-
SHA256
18820505ca0f5ac2407562ec620592b5da23aa0f7cfe7347dcc8589aa45e8d9d
-
SHA512
50c563d46efa5c2ae91e651fe93176c92d8c9fbc70019654f5c5ec771a7756ec5af79bc1188cd845739796732a243191ffff047584d268c33dc2c2559ad52c91
-
SSDEEP
12288:kRycOktU4g/n/t0EW5A0z/FvJwQ5oalK+GDx9Evg7Ik6OQQ52LwRg08y5wj1xTw:IxJU4gf2EW5A25Jr1kxx9EvgIk6k32J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 www.souhu.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 2524 2136 www.souhu.com 88 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\web\www.souhu.com 9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe File created C:\Windows\UNINSTAL.BAT 9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe File created C:\Windows\web\www.souhu.com 9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1532 2524 WerFault.exe 88 4968 4832 WerFault.exe 83 2164 4832 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language www.souhu.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4832 9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe Token: SeDebugPrivilege 2136 www.souhu.com -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2524 2136 www.souhu.com 88 PID 2136 wrote to memory of 2524 2136 www.souhu.com 88 PID 2136 wrote to memory of 2524 2136 www.souhu.com 88 PID 2136 wrote to memory of 2524 2136 www.souhu.com 88 PID 2136 wrote to memory of 2524 2136 www.souhu.com 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9653809fac7b3b612f49d26a99e4bf5a_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 6922⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 6962⤵
- Program crash
PID:2164
-
-
C:\Windows\web\www.souhu.comC:\Windows\web\www.souhu.com1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 123⤵
- Program crash
PID:1532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2524 -ip 25241⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4832 -ip 48321⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4832 -ip 48321⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD59653809fac7b3b612f49d26a99e4bf5a
SHA1b848e0ac13dbf2ea1b60b776b47b9260453694e1
SHA25618820505ca0f5ac2407562ec620592b5da23aa0f7cfe7347dcc8589aa45e8d9d
SHA51250c563d46efa5c2ae91e651fe93176c92d8c9fbc70019654f5c5ec771a7756ec5af79bc1188cd845739796732a243191ffff047584d268c33dc2c2559ad52c91