Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe
-
Size
591KB
-
MD5
acc4a93c1818ca616919c521ef4af756
-
SHA1
c5d7704d09b33a194a422a5ba333e0227489c99d
-
SHA256
3cd40962ef4cd1383d275dc59828c48cc136b2d841f32b9c7446a0f8e1d7509f
-
SHA512
73c112db06ed82e5b9a8041bfc5e6b0520a7dcf3562fa27fff434eb90c16b53564f773b11793e49fdb24aefba96f3a144a196db531a063540f3eedfd6d74c494
-
SSDEEP
12288:1GZFrUwTDJx/s0NDQTI9F3Z4mxxFnUqGGGkYThd5UcO+2Xp:qFrH9x/DNDQkQmXNUVGGk6PrOT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 G_Server1.23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\G_Server1.23.exe acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe File opened for modification C:\Windows\G_Server1.23.exe acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe File created C:\Windows\Delete.bat acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G_Server1.23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties G_Server1.23.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick G_Server1.23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 G_Server1.23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2584 2308 acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe 33 PID 2308 wrote to memory of 2584 2308 acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe 33 PID 2308 wrote to memory of 2584 2308 acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe 33 PID 2308 wrote to memory of 2584 2308 acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2872 2772 G_Server1.23.exe 32 PID 2772 wrote to memory of 2872 2772 G_Server1.23.exe 32 PID 2772 wrote to memory of 2872 2772 G_Server1.23.exe 32 PID 2772 wrote to memory of 2872 2772 G_Server1.23.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acc4a93c1818ca616919c521ef4af756_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\G_Server1.23.exeC:\Windows\G_Server1.23.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5fe05f06395925d12e5f8ee85621be4b6
SHA106e4ee7b2ca36b6cee2dd4709d9e3d85d43cbfa9
SHA256ee6d3c0cbf4f15ee5010a9aa641eb9cb8fad17760775cf444996ebd8a34e7f63
SHA512722b40c5694f79b3ceb6c77e8f4e6a8e7c089aa116604e526f47789d5c77fc53c25fd619be242f493ec86e038434c20e7a8ea51cf0ba46b1cbf68eeba38f0430
-
Filesize
591KB
MD5acc4a93c1818ca616919c521ef4af756
SHA1c5d7704d09b33a194a422a5ba333e0227489c99d
SHA2563cd40962ef4cd1383d275dc59828c48cc136b2d841f32b9c7446a0f8e1d7509f
SHA51273c112db06ed82e5b9a8041bfc5e6b0520a7dcf3562fa27fff434eb90c16b53564f773b11793e49fdb24aefba96f3a144a196db531a063540f3eedfd6d74c494