Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe
-
Size
9.3MB
-
MD5
b0fd2b536b896799d93e33213b6e89b4
-
SHA1
ffd9eb54eda096d0028be0670b00a41d06409c9a
-
SHA256
e6b2b88c96e371e9484d6a4c64e5d6cbb36137120a1339c294583468fd50f976
-
SHA512
5a9587d343519cb3bdefe4a6f4d0126a94aebddc12f4a46879d0a5b40a966621b37c2608cd5f54fef1cbaf3b8f72792d8d6082b8f543eef9b354edf5bed60308
-
SSDEEP
3072:B8R4d9xc8/L+Q+G2yDtajDzQ4GT76Q8BBHEY0oJNx13As35XCKjSiILK7HbS8OaX:Blc4+Q+GKs41gLd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\lsass.exe" reg.exe -
resource yara_rule behavioral1/memory/2644-1-0x0000000000400000-0x0000000000D4A000-memory.dmp upx behavioral1/memory/2644-3-0x0000000000400000-0x0000000000D4A000-memory.dmp upx -
Hide Artifacts: Hidden Files and Directories 1 TTPs 4 IoCs
pid Process 2708 cmd.exe 2748 cmd.exe 2828 cmd.exe 2836 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2768 cmd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3064 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 30 PID 2644 wrote to memory of 3064 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 30 PID 2644 wrote to memory of 3064 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 30 PID 2644 wrote to memory of 3064 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2372 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2372 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2372 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2372 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2708 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2708 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2708 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2708 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 34 PID 3064 wrote to memory of 2768 3064 cmd.exe 35 PID 3064 wrote to memory of 2768 3064 cmd.exe 35 PID 3064 wrote to memory of 2768 3064 cmd.exe 35 PID 3064 wrote to memory of 2768 3064 cmd.exe 35 PID 2644 wrote to memory of 2748 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2748 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2748 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2748 2644 b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe 36 PID 2372 wrote to memory of 2844 2372 cmd.exe 39 PID 2372 wrote to memory of 2844 2372 cmd.exe 39 PID 2372 wrote to memory of 2844 2372 cmd.exe 39 PID 2372 wrote to memory of 2844 2372 cmd.exe 39 PID 2708 wrote to memory of 2828 2708 cmd.exe 40 PID 2708 wrote to memory of 2828 2708 cmd.exe 40 PID 2708 wrote to memory of 2828 2708 cmd.exe 40 PID 2708 wrote to memory of 2828 2708 cmd.exe 40 PID 2844 wrote to memory of 2864 2844 cmd.exe 41 PID 2844 wrote to memory of 2864 2844 cmd.exe 41 PID 2844 wrote to memory of 2864 2844 cmd.exe 41 PID 2844 wrote to memory of 2864 2844 cmd.exe 41 PID 2828 wrote to memory of 2992 2828 cmd.exe 43 PID 2828 wrote to memory of 2992 2828 cmd.exe 43 PID 2828 wrote to memory of 2992 2828 cmd.exe 43 PID 2828 wrote to memory of 2992 2828 cmd.exe 43 PID 2748 wrote to memory of 2836 2748 cmd.exe 42 PID 2748 wrote to memory of 2836 2748 cmd.exe 42 PID 2748 wrote to memory of 2836 2748 cmd.exe 42 PID 2748 wrote to memory of 2836 2748 cmd.exe 42 PID 2836 wrote to memory of 2852 2836 cmd.exe 44 PID 2836 wrote to memory of 2852 2836 cmd.exe 44 PID 2836 wrote to memory of 2852 2836 cmd.exe 44 PID 2836 wrote to memory of 2852 2836 cmd.exe 44 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2992 attrib.exe 2852 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c move /y "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\b0fd2b536b896799d93e33213b6e89b4_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\lsass.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2992
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2852
-
-
-