Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe
-
Size
594KB
-
MD5
aa2f278db32746c7bceb9cf4dd83b421
-
SHA1
2c2e226c98aa2f82180edb4865dc93379233abf6
-
SHA256
a1e7abb54229c375af0a52ad28843a042e674c0a816dfb168dff6722ea02e608
-
SHA512
d59a925b0b0a77e7490fc767a1f45488268eca26f8a1535f77b6cf79a2590b13e83d2757231025aaca1dc83e1f614a73ea4e4eb6a0c2be04e627dda601ba2495
-
SSDEEP
12288:mPbpLfe8brsggak7bAA4EF3Z4mxxCQP9yGIFUmHz:mTpLbbYsEQmXnFZJyz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 svchos.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2724 2720 svchos.exe 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchos.exe aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe File opened for modification C:\Windows\svchos.exe aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe File created C:\Windows\uninstal.bat aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe Token: SeDebugPrivilege 2720 svchos.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2724 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2720 wrote to memory of 2724 2720 svchos.exe 31 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2544 2336 aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa2f278db32746c7bceb9cf4dd83b421_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\svchos.exeC:\Windows\svchos.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\windows\SysWOW64\svchost.exeC:\windows\system32\svchost.exe2⤵
- Suspicious use of UnmapMainImage
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594KB
MD5aa2f278db32746c7bceb9cf4dd83b421
SHA12c2e226c98aa2f82180edb4865dc93379233abf6
SHA256a1e7abb54229c375af0a52ad28843a042e674c0a816dfb168dff6722ea02e608
SHA512d59a925b0b0a77e7490fc767a1f45488268eca26f8a1535f77b6cf79a2590b13e83d2757231025aaca1dc83e1f614a73ea4e4eb6a0c2be04e627dda601ba2495
-
Filesize
218B
MD57c93acb2d5a86b6b5e131ad52c8b094a
SHA1697d13319290ad0b350948e8fb07d1a158034fd9
SHA256beae30a8042a9a04036e7e27da6516971372fe72acb5fb720e2ecddc9a7ab4b0
SHA512052dd241fb11d7a974e3a8b4bbf88de1f56c47ca1c838b2b0f705e36b4c78809577ada7053a4d3d1c3e9bf35cfa38c981cfa22d9e92d254e77caf490ff060a32