Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
a775e92460b959426503963215e302ef_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a775e92460b959426503963215e302ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a775e92460b959426503963215e302ef_JaffaCakes118.exe
-
Size
444KB
-
MD5
a775e92460b959426503963215e302ef
-
SHA1
733eab1063229a9a97e0c825de91b8a4a0b8ce30
-
SHA256
b81b472c61dee5c6c254dc572dc92d63091e386bcdeb7b1c87c1c922d212a808
-
SHA512
34ce3cb5aa1e9d94234a31131b2d23225f4c4c0bb9958dba65a55e68d71af5b79459b2b13ed2eeb05a7284762f79992b2ccf16e8caf0f643221c1d973d399df1
-
SSDEEP
12288:QKPNRt45pUGEec0ugAAbFWwMUTe2Bydon6v2szGv+Kc:QKP1FLvgAAbFWwMSXyi6nj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 gM04201MnFkH04201.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 gM04201MnFkH04201.exe -
resource yara_rule behavioral2/memory/4548-2-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4548-1-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/4548-14-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4548-15-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/2016-18-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2016-26-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2016-31-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gM04201MnFkH04201 = "C:\\ProgramData\\gM04201MnFkH04201\\gM04201MnFkH04201.exe" gM04201MnFkH04201.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2016 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a775e92460b959426503963215e302ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gM04201MnFkH04201.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe 2016 gM04201MnFkH04201.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe Token: SeDebugPrivilege 2016 gM04201MnFkH04201.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2016 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe 87 PID 4548 wrote to memory of 2016 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe 87 PID 4548 wrote to memory of 2016 4548 a775e92460b959426503963215e302ef_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\ProgramData\gM04201MnFkH04201\gM04201MnFkH04201.exe"C:\ProgramData\gM04201MnFkH04201\gM04201MnFkH04201.exe" "C:\Users\Admin\AppData\Local\Temp\a775e92460b959426503963215e302ef_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 13283⤵
- Program crash
PID:2480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2016 -ip 20161⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD52c8268dc1c5f5e0cdb67835cf2d92b7f
SHA18ebef9c28eb689adf5e5a602ae94964cd79dee28
SHA256e6132ba66aded87627b9f5d9b4aa1008a74252a1ff71cf148fa2bb8792f278a8
SHA51233d98ab3d838dc856613831a7530ab17348cacb91c3780c7c46685a7c39d6b64d22fcfed0aa94dd3803d2cb5c7f2cbc7e29027acc50fdf2a3b6c29851acb9fb9