Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
a775e92460b959426503963215e302ef_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a775e92460b959426503963215e302ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a775e92460b959426503963215e302ef_JaffaCakes118.exe
-
Size
444KB
-
MD5
a775e92460b959426503963215e302ef
-
SHA1
733eab1063229a9a97e0c825de91b8a4a0b8ce30
-
SHA256
b81b472c61dee5c6c254dc572dc92d63091e386bcdeb7b1c87c1c922d212a808
-
SHA512
34ce3cb5aa1e9d94234a31131b2d23225f4c4c0bb9958dba65a55e68d71af5b79459b2b13ed2eeb05a7284762f79992b2ccf16e8caf0f643221c1d973d399df1
-
SSDEEP
12288:QKPNRt45pUGEec0ugAAbFWwMUTe2Bydon6v2szGv+Kc:QKP1FLvgAAbFWwMSXyi6nj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 hA04201LcLmG04201.exe -
Executes dropped EXE 1 IoCs
pid Process 2848 hA04201LcLmG04201.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2196-2-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2196-18-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2196-19-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2848-31-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2848-41-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hA04201LcLmG04201 = "C:\\ProgramData\\hA04201LcLmG04201\\hA04201LcLmG04201.exe" hA04201LcLmG04201.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hA04201LcLmG04201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a775e92460b959426503963215e302ef_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main hA04201LcLmG04201.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe Token: SeDebugPrivilege 2848 hA04201LcLmG04201.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 hA04201LcLmG04201.exe 2848 hA04201LcLmG04201.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2848 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2848 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2848 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 30 PID 2196 wrote to memory of 2848 2196 a775e92460b959426503963215e302ef_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\ProgramData\hA04201LcLmG04201\hA04201LcLmG04201.exe"C:\ProgramData\hA04201LcLmG04201\hA04201LcLmG04201.exe" "C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5547561709216ea70391dd193de9e72d7
SHA1234a5c1c67c754639437fe9fb06d9596ee982ac1
SHA256d9e81feb0faceceb5c00e03244c1fd276197adb75b920db233e75c154213507d
SHA512a32cc9aea632f68594737647c89a073333b1eb41510641a792643f1f3cea30e88d64d8f99e0f98c4c04f8591dc7dda9752b9cf5c24331f564a2b7fdd9e50f227
-
Filesize
444KB
MD51ef57ffb8c4e82174ed75345a835451d
SHA1efa3d125e4c47a666db01498586bb9bb4b4673c5
SHA25640122419b6e74e000393821a8aab8137c63b56f748fb1678db6a8df7d486f78c
SHA5123a2587c59b47220150be360bf61e04f79b340fb12afc9190b18d09fdc34f78157e4303e80a57d3478088b2b38f6e108935698368b289396f1efc3073e0ac1dce