Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 21:56
Behavioral task
behavioral1
Sample
acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe
-
Size
20KB
-
MD5
acbd0fd600bd1b675dc96d99f983aed2
-
SHA1
0b96d9d9fcb383c81658bbf2e8ddeb2b871d437e
-
SHA256
6e764b0d56142bcf25f95b0cfb4d87499b14ae3bb4b7276a77848264ce1950b3
-
SHA512
377403e5feecc257f5eb5860c6a7e24253a219a5f7333cf5c0b72edf4c19c37a559d2303de8e3fc85ef6780fc46a417f67f3619c47846888f51b1bcd15b23585
-
SSDEEP
384:hrLlvtAwpAjhj8Rw1FjewNYmmNPzHuBT+Siet/0wzW89z/W6FWmp:llSj7F6+pyuF+SVcsW4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3260 csrss.exe 5100 csrss.exe -
resource yara_rule behavioral2/memory/4588-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x0007000000023486-7.dat upx behavioral2/memory/5100-19-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3260-21-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4588-23-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\com\csrss.exe acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\com\csrss.exe acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\ntserv.exe acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe File opened for modification \??\c:\program files\common files\system\ntserv.exe acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 3260 csrss.exe 3260 csrss.exe 3260 csrss.exe 3260 csrss.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 3260 csrss.exe 5100 csrss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3260 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 85 PID 4588 wrote to memory of 3260 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 85 PID 4588 wrote to memory of 3260 4588 acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe 85 PID 3260 wrote to memory of 5100 3260 csrss.exe 86 PID 3260 wrote to memory of 5100 3260 csrss.exe 86 PID 3260 wrote to memory of 5100 3260 csrss.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acbd0fd600bd1b675dc96d99f983aed2_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\windows\SysWOW64\com\csrss.exec:\windows\system32\com\csrss.exe c:\users\admin\appdata\local\temp\acbd0fd600bd1b675dc96d99f983aed2_jaffacakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\windows\SysWOW64\com\csrss.exec:\windows\system32\com\csrss.exe c:\windows\syswow64\com\csrss.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5acbd0fd600bd1b675dc96d99f983aed2
SHA10b96d9d9fcb383c81658bbf2e8ddeb2b871d437e
SHA2566e764b0d56142bcf25f95b0cfb4d87499b14ae3bb4b7276a77848264ce1950b3
SHA512377403e5feecc257f5eb5860c6a7e24253a219a5f7333cf5c0b72edf4c19c37a559d2303de8e3fc85ef6780fc46a417f67f3619c47846888f51b1bcd15b23585