Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe
-
Size
362KB
-
MD5
b152d7b2933b5005e54c7800e21e6b51
-
SHA1
56b641a15bc654a5a6c9f86c98793a50708a3619
-
SHA256
b101ef477d44db43d9fbefe01450ae7b4e5ce6408f126c2bba3db6737cb081b2
-
SHA512
b45a2325c729d2276b0fd52e301f20f6fee3e0478c9267bdc44382029621a2b9375264635439519757ae7b47cf27ffcaafefa7f81961ddca159199a5f56600e3
-
SSDEEP
6144:X6OnEyX6AlqGkfSOBlWWRmGwL4QQgKKX8x7/2xWqWma2XDzHPt281B6zk:rnzX66hpOjWtGNgDUiWqWNKDrt2Q6zk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 WinHelp32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHelp32.exe b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinHelp32.exe b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe File created C:\Windows\SysWOW64\WinHelp32.exe WinHelp32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2672 WinHelp32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2672 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 91 PID 4988 wrote to memory of 2672 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 91 PID 4988 wrote to memory of 2672 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 91 PID 4988 wrote to memory of 4560 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 92 PID 4988 wrote to memory of 4560 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 92 PID 4988 wrote to memory of 4560 4988 b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe 92 PID 2672 wrote to memory of 1808 2672 WinHelp32.exe 93 PID 2672 wrote to memory of 1808 2672 WinHelp32.exe 93 PID 2672 wrote to memory of 1808 2672 WinHelp32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b152d7b2933b5005e54c7800e21e6b51_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\WinHelp32.exe"C:\Windows\system32\WinHelp32.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\WINHEL~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B152D7~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4060,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD5b152d7b2933b5005e54c7800e21e6b51
SHA156b641a15bc654a5a6c9f86c98793a50708a3619
SHA256b101ef477d44db43d9fbefe01450ae7b4e5ce6408f126c2bba3db6737cb081b2
SHA512b45a2325c729d2276b0fd52e301f20f6fee3e0478c9267bdc44382029621a2b9375264635439519757ae7b47cf27ffcaafefa7f81961ddca159199a5f56600e3