Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
9aab20d98851ad1551512cfa4a451919
-
SHA1
b8b8e9b0b4003543519c5eb793d75d6b43d87e68
-
SHA256
a713e82b257e6893260e4a0a2abf2f87c50ad92375252d695423f3f21cb02020
-
SHA512
067700259fabcf353f73b872250a7ddb3f4e5e61e1c7df2b32603443c940032934a2ff881b894a9dc24d6e125f70ed712b1e4bb40d4c9d8682a7518f69b3e6e8
-
SSDEEP
98304:LbVzn8w6ASFT/ONlEJZU2iNXs2ywzJSZVFMetAPu2rWMqktOJbcYGN:LRFSVKEJZUpNXSwg1tAPu2li1cYi
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2548 Runtime Broker.exe 2016 Runtime Broker.exe 468 Runtime Broker.exe 2152 Runtime Broker.exe 1116 Runtime Broker.exe 1188 Runtime Broker.exe -
Loads dropped DLL 9 IoCs
pid Process 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe 2548 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2548 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2548 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2548 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2548 3028 9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2016 2548 Runtime Broker.exe 32 PID 2548 wrote to memory of 2016 2548 Runtime Broker.exe 32 PID 2548 wrote to memory of 2016 2548 Runtime Broker.exe 32 PID 2548 wrote to memory of 2016 2548 Runtime Broker.exe 32 PID 2548 wrote to memory of 468 2548 Runtime Broker.exe 33 PID 2548 wrote to memory of 468 2548 Runtime Broker.exe 33 PID 2548 wrote to memory of 468 2548 Runtime Broker.exe 33 PID 2548 wrote to memory of 468 2548 Runtime Broker.exe 33 PID 2548 wrote to memory of 2152 2548 Runtime Broker.exe 34 PID 2548 wrote to memory of 2152 2548 Runtime Broker.exe 34 PID 2548 wrote to memory of 2152 2548 Runtime Broker.exe 34 PID 2548 wrote to memory of 2152 2548 Runtime Broker.exe 34 PID 2548 wrote to memory of 1116 2548 Runtime Broker.exe 35 PID 2548 wrote to memory of 1116 2548 Runtime Broker.exe 35 PID 2548 wrote to memory of 1116 2548 Runtime Broker.exe 35 PID 2548 wrote to memory of 1116 2548 Runtime Broker.exe 35 PID 2548 wrote to memory of 1188 2548 Runtime Broker.exe 36 PID 2548 wrote to memory of 1188 2548 Runtime Broker.exe 36 PID 2548 wrote to memory of 1188 2548 Runtime Broker.exe 36 PID 2548 wrote to memory of 1188 2548 Runtime Broker.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9aab20d98851ad1551512cfa4a451919_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5be7631a548ea45c58e25d9c3983bb103
SHA116910a73765ae752e4438975ef621a7f34c6313e
SHA256fbfa16c8f31897ceefddab7d738fd1596028ce0fa3218f5c5c42d1c19469d90e
SHA5120cd1614999964d76681635db5f276b6dceb3b8a3b1005e3095de450cdc0cf471fc7097476ddd89d2ba9783f911b9c5cb4fa36050eccd0924a0d1dc08a523fdd2