Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 13:57
Behavioral task
behavioral1
Sample
a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe
-
Size
282KB
-
MD5
a2ce6e650a6aa090d2b6411cb8599125
-
SHA1
5cb36dcad74c647e597d0a74fa605842da6a43d8
-
SHA256
6fba99be7371090f81077cbe3d679d57d27682d52ef96c8d962619add2170b4e
-
SHA512
507394d3d13c1be69b110245ad46206d2bcbae3c9a7dad32d79a791c2c4904674723b72337ee56d49d6eab7d04f2c9a729e7817190a2631a2f5ebf36b7bfd936
-
SSDEEP
6144:Dcu2JbDktc0z0FM3SybA5U7L0tIV2jq42hgN96VQ8VkmHC9E2:DSbQcg0FGS0LeIV2WDaR8V/l
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00080000000120f4-2.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2436 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2592 G_Server2007 -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\G_Server2007.DLL G_Server2007 File created C:\Windows\RAV2007.BAT a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe File created C:\Windows\G_Server2007 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe File opened for modification C:\Windows\G_Server2007 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe File created C:\Windows\G_Server2007.DLL G_Server2007 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G_Server2007 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 G_Server2007 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 G_Server2007 2592 G_Server2007 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2436 2556 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2436 2556 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2436 2556 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2436 2556 a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2ce6e650a6aa090d2b6411cb8599125_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\RAV2007.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\G_Server2007C:\Windows\G_Server20071⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5a2ce6e650a6aa090d2b6411cb8599125
SHA15cb36dcad74c647e597d0a74fa605842da6a43d8
SHA2566fba99be7371090f81077cbe3d679d57d27682d52ef96c8d962619add2170b4e
SHA512507394d3d13c1be69b110245ad46206d2bcbae3c9a7dad32d79a791c2c4904674723b72337ee56d49d6eab7d04f2c9a729e7817190a2631a2f5ebf36b7bfd936
-
Filesize
218B
MD58c592163dfd82fc176d379d605fae6ba
SHA1ca5c0f8c447d7f994c0baa929fb66139de9c497f
SHA25699cd6d04422631e816aa1b9da054488dc75680ded973b9b6bca6f1c7dca4cd9f
SHA512149f24d3e1ff3f4c3124ea506342ab6bacab3cabe3df0dccd6944b8b772b052de6ae0d2e1ded326f5740a6bebf2f78dbad8b79cd073bfb1276f2493e5161a175