Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe
-
Size
96KB
-
MD5
a167229fecc3a0d554d957536957ca85
-
SHA1
4c4fa5d0f558c04dcd55aeac6f41ed72f01f0e40
-
SHA256
a3ef878b61a0444adeaab4267e9f9915623ce7da698f07c23b90ffd830f2ff09
-
SHA512
dc6d4e5bff1e9fc83b4ef692984218b18ba2b1cbc2ec25cc5e48cf94a0db6eb9587b9cadb97b48cc5a003a1e809c39f308b86a3a4280d214ce509539ebdbf958
-
SSDEEP
3072:VhGiRkXFUTWkTH58o1yf8TIC3xihIlb43g4B:SgkXFUTWkjq78H3xGOb43gY
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2196 taskservices.exe 2880 taskservices.exe 2820 taskservices.exe 2676 taskservices.exe 112 taskservices.exe 1764 taskservices.exe 2812 taskservices.exe 1944 taskservices.exe 3008 taskservices.exe 1640 taskservices.exe -
Loads dropped DLL 20 IoCs
pid Process 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 2196 taskservices.exe 2196 taskservices.exe 2880 taskservices.exe 2880 taskservices.exe 2820 taskservices.exe 2820 taskservices.exe 2676 taskservices.exe 2676 taskservices.exe 112 taskservices.exe 112 taskservices.exe 1764 taskservices.exe 1764 taskservices.exe 2812 taskservices.exe 2812 taskservices.exe 1944 taskservices.exe 1944 taskservices.exe 3008 taskservices.exe 3008 taskservices.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File opened for modification C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe File created C:\Windows\SysWOW64\taskservices.exe taskservices.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskservices.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2196 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 29 PID 2388 wrote to memory of 2196 2388 a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2880 2196 taskservices.exe 30 PID 2196 wrote to memory of 2880 2196 taskservices.exe 30 PID 2196 wrote to memory of 2880 2196 taskservices.exe 30 PID 2196 wrote to memory of 2880 2196 taskservices.exe 30 PID 2880 wrote to memory of 2820 2880 taskservices.exe 31 PID 2880 wrote to memory of 2820 2880 taskservices.exe 31 PID 2880 wrote to memory of 2820 2880 taskservices.exe 31 PID 2880 wrote to memory of 2820 2880 taskservices.exe 31 PID 2820 wrote to memory of 2676 2820 taskservices.exe 32 PID 2820 wrote to memory of 2676 2820 taskservices.exe 32 PID 2820 wrote to memory of 2676 2820 taskservices.exe 32 PID 2820 wrote to memory of 2676 2820 taskservices.exe 32 PID 2676 wrote to memory of 112 2676 taskservices.exe 33 PID 2676 wrote to memory of 112 2676 taskservices.exe 33 PID 2676 wrote to memory of 112 2676 taskservices.exe 33 PID 2676 wrote to memory of 112 2676 taskservices.exe 33 PID 112 wrote to memory of 1764 112 taskservices.exe 34 PID 112 wrote to memory of 1764 112 taskservices.exe 34 PID 112 wrote to memory of 1764 112 taskservices.exe 34 PID 112 wrote to memory of 1764 112 taskservices.exe 34 PID 1764 wrote to memory of 2812 1764 taskservices.exe 35 PID 1764 wrote to memory of 2812 1764 taskservices.exe 35 PID 1764 wrote to memory of 2812 1764 taskservices.exe 35 PID 1764 wrote to memory of 2812 1764 taskservices.exe 35 PID 2812 wrote to memory of 1944 2812 taskservices.exe 36 PID 2812 wrote to memory of 1944 2812 taskservices.exe 36 PID 2812 wrote to memory of 1944 2812 taskservices.exe 36 PID 2812 wrote to memory of 1944 2812 taskservices.exe 36 PID 1944 wrote to memory of 3008 1944 taskservices.exe 37 PID 1944 wrote to memory of 3008 1944 taskservices.exe 37 PID 1944 wrote to memory of 3008 1944 taskservices.exe 37 PID 1944 wrote to memory of 3008 1944 taskservices.exe 37 PID 3008 wrote to memory of 1640 3008 taskservices.exe 38 PID 3008 wrote to memory of 1640 3008 taskservices.exe 38 PID 3008 wrote to memory of 1640 3008 taskservices.exe 38 PID 3008 wrote to memory of 1640 3008 taskservices.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 476 "C:\Users\Admin\AppData\Local\Temp\a167229fecc3a0d554d957536957ca85_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 528 "C:\Windows\SysWOW64\taskservices.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 532 "C:\Windows\SysWOW64\taskservices.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 544 "C:\Windows\SysWOW64\taskservices.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 536 "C:\Windows\SysWOW64\taskservices.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 540 "C:\Windows\SysWOW64\taskservices.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 548 "C:\Windows\SysWOW64\taskservices.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 552 "C:\Windows\SysWOW64\taskservices.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 560 "C:\Windows\SysWOW64\taskservices.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\taskservices.exeC:\Windows\system32\taskservices.exe 564 "C:\Windows\SysWOW64\taskservices.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a167229fecc3a0d554d957536957ca85
SHA14c4fa5d0f558c04dcd55aeac6f41ed72f01f0e40
SHA256a3ef878b61a0444adeaab4267e9f9915623ce7da698f07c23b90ffd830f2ff09
SHA512dc6d4e5bff1e9fc83b4ef692984218b18ba2b1cbc2ec25cc5e48cf94a0db6eb9587b9cadb97b48cc5a003a1e809c39f308b86a3a4280d214ce509539ebdbf958