Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe
-
Size
501KB
-
MD5
a7913461e211158d5ac34ac3bd06bc7b
-
SHA1
71c3f7a9eac34b0b5ccd5ec2df01f9c95f14235b
-
SHA256
5fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13
-
SHA512
8107feec4426f820d3910e35d6e3c1a1aa85a104231a0529f7fcd825f2dfec10fbf856bc2b37c585a34f5d03b514ece7f54b600add6fb668cda0c7d1a7374e04
-
SSDEEP
6144:9moTTLsn36PcB1jtNSHoLR0XbZEpGidU7H6MFkc6iTISTas6oe2wgaMzHXDvVGLn:EoFPoJ3Su0lEpGiexs6asFPw2zvVe
Malware Config
Signatures
-
SaintBot payload 4 IoCs
resource yara_rule behavioral2/memory/4764-11-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral2/memory/4764-14-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral2/memory/4764-33-0x0000000000400000-0x000000000040C000-memory.dmp family_saintbot behavioral2/memory/1764-46-0x0000000000C60000-0x0000000000C6C000-memory.dmp family_saintbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe 31435.exe -
Executes dropped EXE 3 IoCs
pid Process 1356 31435.exe 720 31435.exe 3104 31435.exe -
Loads dropped DLL 2 IoCs
pid Process 3104 31435.exe 1764 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\z_Admin\\Admin.vbs" EhStorAuthn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 31435.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 31435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EhStorAuthn.exe EhStorAuthn.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1068 set thread context of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1356 set thread context of 3104 1356 31435.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EhStorAuthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31435.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3524 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EhStorAuthn.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 31435.exe 1356 31435.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1356 31435.exe Token: SeDebugPrivilege 1764 EhStorAuthn.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 1068 wrote to memory of 4764 1068 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 87 PID 4764 wrote to memory of 1356 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 90 PID 4764 wrote to memory of 1356 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 90 PID 4764 wrote to memory of 1356 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 90 PID 4764 wrote to memory of 3568 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 91 PID 4764 wrote to memory of 3568 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 91 PID 4764 wrote to memory of 3568 4764 a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe 91 PID 3568 wrote to memory of 3524 3568 cmd.exe 93 PID 3568 wrote to memory of 3524 3568 cmd.exe 93 PID 3568 wrote to memory of 3524 3568 cmd.exe 93 PID 3568 wrote to memory of 4408 3568 cmd.exe 96 PID 3568 wrote to memory of 4408 3568 cmd.exe 96 PID 3568 wrote to memory of 4408 3568 cmd.exe 96 PID 1356 wrote to memory of 720 1356 31435.exe 103 PID 1356 wrote to memory of 720 1356 31435.exe 103 PID 1356 wrote to memory of 720 1356 31435.exe 103 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 1356 wrote to memory of 3104 1356 31435.exe 104 PID 3104 wrote to memory of 1764 3104 31435.exe 105 PID 3104 wrote to memory of 1764 3104 31435.exe 105 PID 3104 wrote to memory of 1764 3104 31435.exe 105 PID 3104 wrote to memory of 1764 3104 31435.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\a7913461e211158d5ac34ac3bd06bc7b_JaffaCakes118.exe"{path}"2⤵
- Checks computer location settings
- Drops startup file
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe"{path}"4⤵
- Executes dropped EXE
PID:720
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\31435.exe"{path}"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\EhStorAuthn.exe"C:\Windows\System32\EhStorAuthn.exe"5⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\del.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 34⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3524
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\del.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
501KB
MD5a7913461e211158d5ac34ac3bd06bc7b
SHA171c3f7a9eac34b0b5ccd5ec2df01f9c95f14235b
SHA2565fc108db5114be4174cb9365f86a17e25164a05cc1e90ef9ee29ab30abed3a13
SHA5128107feec4426f820d3910e35d6e3c1a1aa85a104231a0529f7fcd825f2dfec10fbf856bc2b37c585a34f5d03b514ece7f54b600add6fb668cda0c7d1a7374e04
-
Filesize
152B
MD58697f30717821c1e6956166298110442
SHA149fedb8e5bfd8c61020b091595583bfe45bc8bac
SHA25643b93adeaadc1f5c46bad6a8d79ec0ecde5363321d0ae2ff112e7539daaec6e0
SHA5127b86dc49a2ac2a696c7211f252f961264e4faaa5ae98f26616b5432ed805a7216a838cd0cc93a2a84faeed675da7eb74cee43dcc23e62bb48b8e5731b161ac2f