Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe
-
Size
636KB
-
MD5
aba2e50fb22a83f644352baa8736abbf
-
SHA1
58d08157179664c06efa98766289d7f62ece9019
-
SHA256
afbee48316b6e8e9da48d9bfafd569a131c630bdab8fc4d29f0ad3c1b1da3828
-
SHA512
d0dd55b08c965a5c8451d26de5da2830601e5048b0b5318d33c3fe9a0d934c244a4e99a57c6ab478e28cff8907406b4b719840e79bb638ad2ce9f4d2e6f6ee1f
-
SSDEEP
12288:sb6FlOWf+udFfWXma7F4+/lATF3Z4mxxcFtg+vC4GWCiO:m2Bq7m+/lATQmXcm+KpFiO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3124 vass.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\vass.exe aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\vass.exe aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1568 aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe Token: SeDebugPrivilege 3124 vass.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3124 vass.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3124 wrote to memory of 1608 3124 vass.exe 88 PID 3124 wrote to memory of 1608 3124 vass.exe 88 PID 1568 wrote to memory of 4752 1568 aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe 89 PID 1568 wrote to memory of 4752 1568 aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe 89 PID 1568 wrote to memory of 4752 1568 aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aba2e50fb22a83f644352baa8736abbf_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Program Files (x86)\vass.exe"C:\Program Files (x86)\vass.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5aba2e50fb22a83f644352baa8736abbf
SHA158d08157179664c06efa98766289d7f62ece9019
SHA256afbee48316b6e8e9da48d9bfafd569a131c630bdab8fc4d29f0ad3c1b1da3828
SHA512d0dd55b08c965a5c8451d26de5da2830601e5048b0b5318d33c3fe9a0d934c244a4e99a57c6ab478e28cff8907406b4b719840e79bb638ad2ce9f4d2e6f6ee1f
-
Filesize
218B
MD5addcf83c88886a3663243c83ef0b07bc
SHA1e6630398c186dfe4f0000b455351836b488ad359
SHA2566e282b29f8ae52f4a82eaf624a8954a077c53d3f2ae0ac6a5c32f0ca967a73db
SHA51243efef34087cd2d033a8147d752bda3845fad1be625014435b5e2e3bb43bc5c76d4bc771547fae3c2ad383b6fea63f45fe23050d09ba17e2d129931827e2133c