Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 00:43
Behavioral task
behavioral1
Sample
a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe
-
Size
13KB
-
MD5
a4bd51e79f8f19f9dbf521f0933612bb
-
SHA1
60e4ffb88f928cee0435e79112373388ff0e0682
-
SHA256
dbfc1a8b306c24d3198a7890721bcde2ac6ee51333710d0496a636f5fdb16d74
-
SHA512
a978c1efe9b0a6aaa00ae33b3fe01014e54c6afcb021cc5cea243a0d7f21e89363caba0724ee10dd8d797dd101e696f74cda50b03a6d57197eeab3fbfab1eff3
-
SSDEEP
384:PtGvGV1sd8zobWctExeNmxKsyK7ocJx2y:PtsGVM8YWc2xeNmUFK7ocj2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2060 cenvtak.exe -
resource yara_rule behavioral2/memory/1448-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00070000000234f1-4.dat upx behavioral2/memory/1448-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2060-8-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cenvta.dll a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe File created C:\Windows\SysWOW64\cenvtak.exe a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cenvtak.exe a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cenvtak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2060 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 84 PID 1448 wrote to memory of 2060 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 84 PID 1448 wrote to memory of 2060 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 84 PID 1448 wrote to memory of 4928 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 97 PID 1448 wrote to memory of 4928 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 97 PID 1448 wrote to memory of 4928 1448 a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cenvtak.exeC:\Windows\system32\cenvtak.exe ˜‰2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\a4bd51e79f8f19f9dbf521f0933612bb_JaffaCakes118.exe.bat2⤵
- System Location Discovery: System Language Discovery
PID:4928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD547a3645dc3278de66eac78822ee88201
SHA111d9b213124a1be261c23236e577a291161e0889
SHA25660eab9f78f8160d8a91e16b90e159f80324dbb5b8926d741bf7bc0cacc2265e2
SHA5124ad78295cceb634f872a2d17cc0a31072a189d6023df6d39514694e379206285fa1a8ae8327455abe39f3117f0afff649b3e5e69b2caf6e187f042263f747cea
-
Filesize
13KB
MD5a4bd51e79f8f19f9dbf521f0933612bb
SHA160e4ffb88f928cee0435e79112373388ff0e0682
SHA256dbfc1a8b306c24d3198a7890721bcde2ac6ee51333710d0496a636f5fdb16d74
SHA512a978c1efe9b0a6aaa00ae33b3fe01014e54c6afcb021cc5cea243a0d7f21e89363caba0724ee10dd8d797dd101e696f74cda50b03a6d57197eeab3fbfab1eff3