Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe
-
Size
169KB
-
MD5
ad9890d47696d627e240a9f2e37218ee
-
SHA1
9c5bd38aa995510b937d408ec5f9fb10a23405c2
-
SHA256
bfa5778739336affefdf7843b62c32745bcf4cf82a7a03231a0f6c0d6fe4c17e
-
SHA512
aaf1f9feee4a1484107fcc477b06b958c12058209821522a12a13b7e81eb759ea8dedfd492674555ab406644e2f3008a9c66e4bb099a9e9891d3d8dd6e825ce2
-
SSDEEP
3072:ecUcm0X3qDOUwUNvo8Hj/64qDuibRF+phTjJfscmIBaOgg+mOi5f:ecUK3qDpvTT6LDuibf+phTjJEmBdgpi5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2376 sesdessecetra.exe 2916 sesdessecetra.exe -
Loads dropped DLL 8 IoCs
pid Process 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 2376 sesdessecetra.exe 2376 sesdessecetra.exe 2376 sesdessecetra.exe 2376 sesdessecetra.exe 2916 sesdessecetra.exe 2916 sesdessecetra.exe 2916 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 964 set thread context of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 2376 set thread context of 2916 2376 sesdessecetra.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 2376 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 964 wrote to memory of 1668 964 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2376 1668 ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32 PID 2376 wrote to memory of 2916 2376 sesdessecetra.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad9890d47696d627e240a9f2e37218ee_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ad9890d47696d627e240a9f2e37218ee
SHA19c5bd38aa995510b937d408ec5f9fb10a23405c2
SHA256bfa5778739336affefdf7843b62c32745bcf4cf82a7a03231a0f6c0d6fe4c17e
SHA512aaf1f9feee4a1484107fcc477b06b958c12058209821522a12a13b7e81eb759ea8dedfd492674555ab406644e2f3008a9c66e4bb099a9e9891d3d8dd6e825ce2