Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe
-
Size
39KB
-
MD5
b122a3a8578ecdf75a6343441e1e804d
-
SHA1
761e0c91c9bcfff977f0bc61b78d1a0278134868
-
SHA256
89fa499b45546a9a9e71a5cafc9c743decc52dab52139ed0c08182a9f450cbbb
-
SHA512
72a7c2e781359979051ea41ae5e3980c425e856e627c91a2cf59f7b99f1c91d2bb6ade0214a66238344d5a6e9718a093cadf6e69dea67a86506394eb661ad9bb
-
SSDEEP
768:nM9DFuNKOXaT+Mo8GPM6vBLI+3TjmmxdmGQX6QugeVJp4zJ8Q:M9UNKOBtMc5/O2mGQXV2VJpwqQ
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\msinn.exe" b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe msinn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe msinn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\msinn.exe" msinn.exe -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2884 msinn.exe -
Loads dropped DLL 2 IoCs
pid Process 2916 cmd.exe 2916 cmd.exe -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe msinn.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\msinn.exe b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msinn.exe b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe File created C:\Windows\SysWOW64\msinn.exe msinn.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msinn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2916 2928 b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe 30 PID 2928 wrote to memory of 2916 2928 b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe 30 PID 2928 wrote to memory of 2916 2928 b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe 30 PID 2928 wrote to memory of 2916 2928 b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2884 2916 cmd.exe 32 PID 2916 wrote to memory of 2884 2916 cmd.exe 32 PID 2916 wrote to memory of 2884 2916 cmd.exe 32 PID 2916 wrote to memory of 2884 2916 cmd.exe 32 PID 2884 wrote to memory of 2744 2884 msinn.exe 33 PID 2884 wrote to memory of 2744 2884 msinn.exe 33 PID 2884 wrote to memory of 2744 2884 msinn.exe 33 PID 2884 wrote to memory of 2744 2884 msinn.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b122a3a8578ecdf75a6343441e1e804d_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\28sagl15.bat2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\msinn.exeC:\Windows\system32\msinn.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Indicator Removal: Clear Persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\28sagl15.bat4⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125B
MD55d92bcd578fa29f8bcd30fadfb593336
SHA1b4d0915221fd51b94f4def70deeb536fe7eb3443
SHA25649305dc9688744753552fb8aace4b2c6937800f16aff1315cd16d43f95654653
SHA5127e053d8c0908eaadebdb8c65dca10a03299e58ebf53f4a4a66be228bdf5fe3b2588d6f5263d47338fbffa93b13fc071af0bed22af486744077efc58debe8be50
-
Filesize
235B
MD5fe795b84c3858861962157defb3d2906
SHA173753809018b1e7c34d04dfedb8f8ed7437ff9aa
SHA2561a98594d9307db72bdf02280ebdb8d8d6e075c8b8f5642c424ba3ced6f218692
SHA5125f8c776b78ba643e4b5cdbc4baa4756b387959f0485ce6d9f08a911618afd7d4a0e27b3b6fc1c063364d20b310ce504bc0dfafa07abf8778cc0b19e53ea1adc5
-
Filesize
39KB
MD5b122a3a8578ecdf75a6343441e1e804d
SHA1761e0c91c9bcfff977f0bc61b78d1a0278134868
SHA25689fa499b45546a9a9e71a5cafc9c743decc52dab52139ed0c08182a9f450cbbb
SHA51272a7c2e781359979051ea41ae5e3980c425e856e627c91a2cf59f7b99f1c91d2bb6ade0214a66238344d5a6e9718a093cadf6e69dea67a86506394eb661ad9bb