Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:37
Behavioral task
behavioral1
Sample
96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe
-
Size
10KB
-
MD5
96b002f6ccb84c0a34a105525e9d3430
-
SHA1
afc9a4bcdfbcb46b32ec0b9a71a6b27d54046c66
-
SHA256
2b7a19c7da364709ce4302bc74bb8997d971f84e9d092ba8a13fc5ae2aee0447
-
SHA512
6152f103e5c4be9885052f652fdad4b1a289c50bcc7541b8ec6f06a26f9e25820834892b542fdd1b90d3b4d2278edf6e4fcc81dc6ac0f20aea867692084b6992
-
SSDEEP
192:odLRTqMvpUqpjt2MoZDd7eSbB+mh5JhgJAPfiQ4NhOdeOAbQFTHZ:odLR+SpNh2Mo5d7eabAACQzdeOEK9
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2168 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 xpsbosk.exe -
Loads dropped DLL 2 IoCs
pid Process 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1508-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x002e0000000160e7-3.dat upx behavioral1/memory/2704-12-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1508-10-0x0000000000030000-0x000000000003E000-memory.dmp upx behavioral1/memory/1508-20-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2704-22-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpsbos.dll 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe File created C:\Windows\SysWOW64\xpsbosk.exe 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xpsbosk.exe 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2704 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2704 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2704 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2704 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2168 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2168 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2168 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2168 1508 96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\xpsbosk.exeC:\Windows\system32\xpsbosk.exe ˜‰2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\96b002f6ccb84c0a34a105525e9d3430_JaffaCakes118.exe.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5681d5e61fd6d3e44da69a92433d48a87
SHA1d3120f279c86871f8b4e00beb3439f47f83c2946
SHA256dace5933ea1984cfb39fd8350a12f286c9c2d17d9038e206a7abc69ed7f34952
SHA5120d2860d15fd0682c6b53cf6ebea373992f3b2c247923eb9f4ca00cd820598a7ebbd85052e833fde4c9443c802e44578afa26da9f0a5ba97d2e66b12c2abd886d
-
Filesize
10KB
MD596b002f6ccb84c0a34a105525e9d3430
SHA1afc9a4bcdfbcb46b32ec0b9a71a6b27d54046c66
SHA2562b7a19c7da364709ce4302bc74bb8997d971f84e9d092ba8a13fc5ae2aee0447
SHA5126152f103e5c4be9885052f652fdad4b1a289c50bcc7541b8ec6f06a26f9e25820834892b542fdd1b90d3b4d2278edf6e4fcc81dc6ac0f20aea867692084b6992