Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe
-
Size
25KB
-
MD5
ad3ac3087fd4df6ee54abfbf00ca840c
-
SHA1
d03570e901bba2815d71f20635ae5938304e6537
-
SHA256
837d90c3aa41e6967d94371313344efdb722eddad122f4baac84b67c5b480b45
-
SHA512
fc300be8836826a11c11c468ff85af9296fb56d74e4d27ddfd2f76a310c6b514f029cf90eada96787d949e6cb0d472a092664014ec82b244cf3acd77699e8a52
-
SSDEEP
384:ORVdMrJpdYtrV79fy2XsWra7ybsexeoYzzumoAb0aYWcDhXdvgPuouzQb/XlF:uMrW9V7h8oYzzu7klYWcvvBiF
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2212 set thread context of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2080 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2080 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2080 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2080 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2364 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2364 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2364 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2364 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 32 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2212 wrote to memory of 2824 2212 ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe 35 PID 2080 wrote to memory of 2184 2080 net.exe 36 PID 2080 wrote to memory of 2184 2080 net.exe 36 PID 2080 wrote to memory of 2184 2080 net.exe 36 PID 2080 wrote to memory of 2184 2080 net.exe 36 PID 2364 wrote to memory of 2964 2364 net.exe 37 PID 2364 wrote to memory of 2964 2364 net.exe 37 PID 2364 wrote to memory of 2964 2364 net.exe 37 PID 2364 wrote to memory of 2964 2364 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"1⤵
- Modifies security service
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" (2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 (3⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad3ac3087fd4df6ee54abfbf00ca840c_JaffaCakes118.exe"2⤵PID:2824
-