Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
-
Size
13KB
-
MD5
a0acbc800f424f097e86cc46f6dbc89d
-
SHA1
9ef7ccc0d652177355791c4a1f1243d7b0d04fd6
-
SHA256
0b97c2370eda2bef6f974851702c6cb95e997871498224d43c26152093d42c8b
-
SHA512
ee97bd3468dc4c097ec37dc7fd7400db2b142749ba0d6f273a528b7565f8e93dc8e773962f8cb9c4495d0de74a74f9af6e84a39a5492ae65544cad88c3c2aeee
-
SSDEEP
384:MKakE9pT5A6V6Z4LS6s/m5zLxDD6TBlgB:BBE9J5L6Zgsm5zLxDD6Tc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\slbiopfs2.dll = "{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\slbiopfs2.nls a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe File created C:\Windows\SysWOW64\slbiopfs2.tmp a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\slbiopfs2.tmp a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32\ = "C:\\Windows\\SysWow64\\slbiopfs2.dll" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32\ThreadingModel = "Apartment" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A} a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 280 wrote to memory of 2740 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 30 PID 280 wrote to memory of 2740 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 30 PID 280 wrote to memory of 2740 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 30 PID 280 wrote to memory of 2740 280 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\898A.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5b29ffbdd4ffd7f18824fb1df9f1b0a76
SHA15ea562578a6a42ad2b652107f12cc6fe210dfa20
SHA25683aca7786088c40538ac7900038c365972d2c8b4146019234cbdeba3b4d9a4a8
SHA512629c7bd23ed1a737d4ef1023de82c154636443e1b696c4b7b6fe71e272d06e611abc5958cb5a2fb94a9c0650e104220a3cf00b3ddc46351cae39fd50cdabe880
-
Filesize
428B
MD5b3a3567571d4143c292cd004e4936f96
SHA161cca5c1984fe81d3f93cb97d1d4381001845244
SHA256fa9b2b45c2181f33e1a9445a4491e0c03cdf65f2722fe9123297c048599db89f
SHA512ae69fd9c8f38f56df7933cbef4ac0b9314e70b0899f267a8b347e370360a3b57dddcb37e892049c832660597a5722f44243044bbb62cc4cce29d8dc9294d6319
-
Filesize
2.5MB
MD5f4df7a997bffd45f15013f0a91fbf3b4
SHA102cec1ae027b42671284979fb597fe550a4f2162
SHA2565cb8e39a48065c5636775f2ee743c59cb62cbaa0bf4c77beb84c47305f66796f
SHA5129ee56a290a50d706a12d8fae71b0fee4c8d06b3af20cf91233b21e0f647bbc4d81c79abe3d85a491e967451cacd7129d75808fdb2d9c1b3b01684e8cc9872f32